Software


Malware Clean-Up Swamps IT Managers

Companies favor security technology, overlook adequate user training

Case Study: Wireless Provider's Remote Access Success

Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?

Careers: IT Employment Bucks National Trend

IT has experienced relatively healthy job growth in the U.S. during a period when job growth as a whole remained stagnant

Netezza and SPSS Strike an Accord

The data warehousing appliance arms race spills over into the partner arena.

With Xcelsius, Business Objects Touts Better-Than-Excel Excel

Business Objects positions Xcelsius as a complement to, and extension of, Microsoft Excel

Big Blue’s Master Data Product Push

Don’t look for WebSphere DataStage this year...



Office 12: What IT Needs to Know

Behind the flashy new graphical user interface and productivity enhancements is one big impact to IT. We spotlight three key benefits -- and one big expense -- any IT department should consider in its upgrade plans.

In Search of…Smarter Information Analysis

The convergence of data mining and artificial intelligence technologies has some folks screaming Big Brother—perhaps with good reason.

Conference Kernels: BI Mega-Trends for 2006

Using the TDWI Business Intelligence Framework, research and services senior manager Philip Russom outlined four ‘mega-trends’ to watch in 2006.

SQL Server 2005: Are We There Yet?

Microsoft’s next-gen database still isn’t generally available.

Business Objects 'Opens' Crystal for Eclipse

The new Crystal Reports for Eclipse is billed as a completely Java-based reporting solution.

Layering is Key to Countering Zero-Hour Attacks

Post-virus attack cleanup costs $200 per system. Taking a layered approach to protection can help keep your PCs safe.

Case Study: Outsourcing Threat Detection

With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring