Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.
Sooner or later, technology to allow a true ILM was bound to come along.
Two mainframe number-crunching mainstays make their bids for broad BI dominance
Management of IT performance for business results is within the reach of most organizations
BI 2.0 gives you “one version of the truth” in real time.
V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering
Thirteen percent of CIOs expect to hire new IT workers in the coming quarter
Business Objects must surmount several obstacles on its way to BPM prominence.
Officials say the new suite will help SPSS break through to mainstream success.
Forget thin clients, the next frontier in enterprise information delivery might be mobile, roaming, or—heck—even roving clients.
Why IT must take a lowest common denominator approach to dealing with the suits
IBM is touting a more abstract kind of workload—the mainframe-as-service-enabled hub
As you consider your archive options, don’t count out optical.