Some people don’t believe in making numbers just fit the bill; they ask at the source and tell it like it is.
Manufacturers' inability to patch their computers against every newly discovered virus and worm leaves their systems highly exposed
Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents
CRM competitors could target potentially disaffected customers—particularly if Oracle is less than sincere about servicing them
Security hiring growth slow but steady; end-users blame ISPs and product vendors for spam
As the major enterprise application vendors flesh out their analytic offerings, Siebel is in the forefront
Business intelligence vendors must make their software more affordable—and provide better service once it’s been sold
Long-time Notes and Domino customers regard Workplace with suspicion—and IBM is still having trouble positioning the relationship between the two platforms
A new software license gives OpenSolaris a good foundation—even if Sun hasn’t worked out all the legalities of porting CDDL code to Linux
Big Blue’s durable workhorse still has plenty of kick left in it. And customers, for that matter, are increasingly willing to deploy it in support of new workloads
Finally, after nearly six years, Avamar Technologies has received the third of the 22 patents it has applied for.
With more-secure browser alternatives now available, will IE go by the boards?
Many organizations skimp on maintaining health data centers, putting security at risk
As Microsoft preps its most ambitious business intelligence offering to date—SQL Server 2005—the good relations it enjoys with some long-time BI partners could be at risk
Is Cognos positioning itself to better tackle Business Objects on its own turf?
Group Policy settings control almost every aspect of a computer from a central location, but incorrect settings can cause serious problems for clients and servers within the domain. We explain how to avoid problems from these error-prone settings.