Pop quiz: A bank employee “misplaces” a laptop containing highly sensitive data. What do you do? What do you do?
What are the economics of bundled ETL, and just what do Oracle and Microsoft bring to the table?
Big Blue already markets several content management-related offerings, so what does FileNet bring to the table?
FileNet gives Big Blue best-of-breed technology, a huge installed base, and a steady stream of revenue.
Grid system complexity can tie an organization in knots in an endless debate trying to justify a deployment. The Hierarchical Usage Model Framework may help.
Demonstrations at last week's annual Black Hat cybersecurity conference employed Web-page-embedded JavaScript to attack corporate servers.
How one company learned if their outsourcing decision was the right one.
Like a summertime guilty-pleasure-but-pointless novel, and SNIA’s latest document on information lifecycle management makes for nice beach reading.
Symantec survey focused on IT professionals’ views on vulnerability research and challenges they expect in the next year.
A financial advisory firm brings in an integration partner to help expand its financial systems
New study highlights commonalities between companies with the fewest IT compliance deficiencies.
Three key benefits of trusted computing, and what IT should do now to prepare for trusted computing initiatives
An improving economy and more robust IT budgets are helping loosen the budget purse strings for key IT line staff positions but not for key management positions surveyed.