IT modernization projects help you deal with old application ghosts before they spook the bottom line. We offer seven best practices for controlling and managing a project
The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.
In spite of IBM’s best efforts, a lot of customers continue to run mission-critical applications on older MVS mainframes
An end user with two real-time anti-spyware engines asks if too much anti-spyware software is a bad thing
Many enterprises still show a strong bias for Crystal Reports
BPM has long had an obscure relationship to BI
Data infrastructure can hamstring your marketing success
XQuery support, .NET support among BI-friendly features
It's tough to determine an ROI for security investments. Looking at cost avoidance may be the way to go.
First, SMI-S, then Continuous Data Protection, and now ILM: SNIA’s on another meaningless standards-making jag
Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4
IBM hopes to double the number of participating institutions by the end of 2005