Using a password hash, attackers can crack a database in about four minutes
Thanks to a variety of regulations, businesses must retain e-mail and instant messages, creating an information glut. Here’s how to manage it.
One-upmanship brings responsibilities to prove or dispel the boast.
It’s hard to avoid the impression that SAP is making a big BI push.
While business intelligence vendors continue to tout the benefits of platforms, organizations should be as mindful of the minuses as the pluses.
Firstlogic refreshes its IQ8 data quality suite with improved dashboarding and collaboration features, project monitoring and reporting capabilities.
Information Builders CEO Gerry Cohen doesn’t mince words, and as our own Stephen Swoyer found it, the New York-based software player has a few cards up its sleeve.
Just as customer data integration (CDI) is getting hot, Acxiom Corporation finds itself preparing for a potential takeover.
Watching inbound and outbound Web applications communications for signs of attack
IBM’s new virtual desktop solution emphasizes a centralized, host-based infrastructure and a lightweight, terminal-esque desktop—and virtualization, too
A forensic readiness program helps a company protect its assets and know when they’ve been compromised.
There’s an ugly downside to many of the utility computing technologies on the market today
While top administrators are spending money for things they don’t understand, IT professionals fail to see the value in overpriced goods.
With so much industry buzz around configuration management databases, why are so few actually in production?