Software


Oracle Database Passwords Vulnerable to Attack

Using a password hash, attackers can crack a database in about four minutes

Regulations Driving E-mail, IM Backup and Recovery

Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.

You Asked For It: HDS TagmaStore versus EMC DMX3

One-upmanship brings responsibilities to prove or dispel the boast.

SAP's Bold BI Push

It’s hard to avoid the impression that SAP is making a big BI push.



All the BI World’s a Platform

While business intelligence vendors continue to tout the benefits of platforms, organizations should be as mindful of the minuses as the pluses.

Firstlogic’s Tough Sell

Firstlogic refreshes its IQ8 data quality suite with improved dashboarding and collaboration features, project monitoring and reporting capabilities.

Q&A: Straight Talk With Information Builders’ Straight Shooter

Information Builders CEO Gerry Cohen doesn’t mince words, and as our own Stephen Swoyer found it, the New York-based software player has a few cards up its sleeve.

The Axe at Acxiom? ValueAct Capital Sends Letter

Just as customer data integration (CDI) is getting hot, Acxiom Corporation finds itself preparing for a potential takeover.

Q&A: Monitoring What Web Applications Divulge

Watching inbound and outbound Web applications communications for signs of attack

IBM Offers New Take on Thin-Client Computing

IBM’s new virtual desktop solution emphasizes a centralized, host-based infrastructure and a lightweight, terminal-esque desktop—and virtualization, too

Forensic Contingency Planning: Where to Start

A forensic readiness program helps a company protect its assets and know when they’ve been compromised.

Taking Control of Data Center Automation

There’s an ugly downside to many of the utility computing technologies on the market today

Access Density: The Cause of Our Storage Woes?

While top administrators are spending money for things they don’t understand, IT professionals fail to see the value in overpriced goods.

Maximizing ITIL Standards: Choosing a CMDB Approach

With so much industry buzz around configuration management databases, why are so few actually in production?