Software


Google Desktop Search Tool Raises Security Concerns

Free hard-drive indexing utility raises corporate security and privacy questions

Microsoft CRM: An Overnight Sensation

Microsoft’s CRM suite is less than two years old, but it’s already being used by 1,600 customers

XQuery Use Grows Despite Lack of Finalized Standard

After over five years in the making, the XML Query language standard is still missing in action

Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

SOAs: Too Good to Be True?

The service-oriented architecture vision in practice may not be quite the slam dunk it looks like on paper

Outsourcing in Reverse: Foreign Companies Send Jobs to the United States

Not all outsourcing activity is a net loss for American workers

Tiered Access: iSCSI for the Enterprise, Part 2

When is iSCSI a more appropriate solution for your data center than fibre channel?



Q&A: Strategies for Automating Software Development

Programming automation gives developers more freedom to do their jobs

Scary Storage

Fall Storage Networking World at exactly the right time, on the eve of Halloween, since it is where you can go to watch the industry eat its young. Big players often use the venue to announce that they are swallowing up smaller firms.

Outsourcing Survey, Part 2: More Than Cutting Costs

The results of the 2004 Enterprise Systems Outsourcing Survey are in. In the second article of our series we examine what's motivating our Outsourcing Survey respondents to move projects to other providers. Surprisingly, it's not just about cutting costs.

Business Objects 11 Beta Features Back-End Integration

With competitors claiming that the Crystal acquisition has been a dud, Business Objects preps the next major release of its BI suite

Teradata Revamps DW for SOA, BI

Warehouse 8.0 boasts much of the plumbing that organizations will need to support service-oriented architectures

Thwarting Next-Generation Denial-of-Service Attacks

Domain name registrar copes with DoS spike

In Brief

Top 20 Windows/Unix vulnerabilities, Microsoft flaws and fixes

Q&A: Using Business Rules to Tackle Vulnerabilities

Identifying business assets to aid threat mitigation

Auditing Security Baselines with Security Templates

There are two primary methods for auditing computers with security templates: manually and using a script command. We explain the benefits and drawbacks of each.

DataBeacon Embraces .NET in Query/Analysis Solution

Company announces Smart Client, an end-user ad hoc query and analysis solution based on Microsoft’s .NET platform

SCO: If You Can’t Beat ‘Em, Join ‘Em

The embattled company plans a pro-SCO Web site to counter the success of Groklaw.net