Software


Zotob Continues to Hammer Windows 2000

Exploits are already circulating for a recently announced Windows plug-and-play vulnerability. Experts recommend better endpoint security controls.

Storage Pain: The Consumer View (Part 1 of 2)

Food to soothe the savage beast…..and maybe solve some problems.

The Mainframe Loses One: IBM Ends Development, Resale of OLAP Engine

IBM’s decision to eighty-six its DB2 OLAP Server has ramifications for mainframe and iSeries shops

Regulations, Fear Driving More-Secure Code Development

To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach



Case Study: RuffaloCODY Hones Its Analytic Chops

RuffaloCODY turned to a packaged-BI solution from MicroStrategy. The result: 50 percent growth in the last year alone.

Technology Preview: Oracle’s Next-Gen ETL Tool Comes into Focus

In the next-generation release of Oracle Warehouse Builder, due in January, Oracle officials promise a significant improvement

IBM Opens Up on Enterprise Search

Analysts give Big Blue a thumbs-up for both vision and execution

TDWI Report Excerpt: Turning Business Intelligence into an Enterprise Resource (Part 1 of 2)

What organizations must do to transform BI from a departmental resource to an enterprise one.

Utility Computing: Implementation Approaches

Instead of making big-bang investments, customers can reap the benefits of utility computing in more affordable ways.

Why ERP Does Matter

Companies that consolidate their ERP stacks and implement consistent data definitions can reduce operating costs by nearly 25 percent

Next-Generation Storage: Think Virtual

With improvement in storage virtualization products’ features and reliability will the technology choices get any easier?

Sun’s Secret Weapons at STK

Things change, no doubt about it. But honesty and integrity remain the mainstays of success.

Microsoft Can’t Count: New Vulnerability Disclosure Criticism

Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail

2005 Salary Survey, Part 1: IT Staff Positions

Salary growth remains spotty for it staff