Software


VMware Workstation 6 Beta Begins

Virtualization vendor VMware is shipping the public beta version of its Workstation 6.0 product.

Yet Another Word Zero-Day Exploit Surfaces

A new exploit potentially lets an attacker execute code on a user’s machine

MicroStrategy’s Dashboard Splash

Call it a fashionably late, but nevertheless feature-complete arrival.

Oracle’s BI Suite Reborn?

The revamped BI Suite incorporates analytic technology from the former Siebel Systems Inc., which Oracle acquired 16 months ago.

Podcast: How to Avoid Project Management Failures

We explore new research with the author of “My Life is Failure -- 100 Things You Should Know to be a Successful Project Leader” so you can learn from the mistakes of others.



Innovative Web 2.0 Firms Storming the Next IT Battleground

Web 2.0 technology is helping firms bring applications to market faster than ever.

Sales Force Automation, SaaS-Style—It’s Xact-a-Mundo

If you haven’t yet heard of SaaS BI startup Xactly, consider yourself duly informed.

Analysis: Intel, Sun Tie the Knot

After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?

PGP: Encryption Everywhere

PGP Corporation may have the handle on protecting sensitive data everywhere

Migration Readiness Assessments, Part 2: Reaping the Benefits

How to leverage the results of an MRA as you develop migration strategies and staffing plans, establish rules for data conversion and system cutover, and move further to mitigate project risk.

The Seven R’s of Change Management

Seven simple questions can help you assess change-related risk and gauge the effectiveness of your change-management process.

Hybrid Drives: Good Architecture or All Flash?

Is Microsoft's Vista responsible for a push to hybrid drives?

PSI Strikes Back Against IBM

PSI strikes back, charging IBM with antitrust violations, unfair competition, and business torts

Beyond the Firewall: Protecting Information Outside the Network

Information protection has transformed from protecting the network to protecting the information -- wherever it resides.