Composite applications -- containing logic and data from multiple IT sources coupled with Web services standards -- bring higher end-user satisfaction without requiring full SOA implementation, a new research report reveals.
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
Views of tiered storage differ wildly because there is no clear, concise, universally accepted definition of the technology. We offer a definition that spells out the four attributes of tiered storage.
Warehouse Miner 5 looks like Teradata’s most ambitious release to date.
If Gartner says HP has finally arrived as a BI power player, then HP must finally have arrived as a BI power player, right?
After a marriage of more than 15 years, NCR and Teradata to part ways.
Both Compuware and IBM notched a pair of mainframe-related acquisitions
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
Harvesting business rules from a legacy application has benefits ranging from simple documentation to application modernization. We provide a practical approach for collecting rules in a process context.
The release of CERT information raises a controversy between storage security vendors.
No licensing expense for partners
The application server marketplace isn’t the exclusive playground of J2EE and .NET: CICS is amply represented, market watcher IDC says
Software architecture management solution extended beyond applications to include databases and services
Industry watchers once scribbled epitaphs for pure-play competitor Informatica. A funny thing happened, however: Informatica has thrived.