Software


Q&A: What Makes a Good Chief Information Security Officer?

To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.

Can Networks Defend Themselves?

Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.

Storage Products of the Year

Our storage guru Jon Toigo has always been suspicious of industry awards. Rather than looking at slick literature, Jon evaluates dozens of products each year to find what's worthy of your consideration. Here are the Toigos for 2005.

Careers: Study Shows You're Working Harder than Ever

If you think you’ve got a lot more on your plate these days, you’re probably right



Actuate Updates Financial Performance Management (FPM)

With its better-than-spreadsheet-spreadsheet marketing strategy, Actuate could find an eager audience for its FPM tool.

Firstlogic and Pitney Bowes: The Data Quality Dynamic Duo That Almost Was

What really happened—and where does Firstlogic go from here?

The SQL Server 2005 Coattail Effect

Will BPM and ETL ride to mainstream success on the coattails of Microsoft’s SQL Server 2005 juggernaut?

Take IT from Bottom-Line Expense to Strategic Investment

How can IT—which takes 4.5 of a company's revenue—show itself to be a positive force on the company's bottom line?

Case Study: Wireless Provider's Remote Access Success

Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?

Careers: IT Employment Bucks National Trend

IT has experienced relatively healthy job growth in the U.S. during a period when job growth as a whole remained stagnant