Company offers outsourced wireless LAN to overcome security vulnerabilities
Short-term data loss isn't all you have to guard against
A cooler, more flexible, and more powerful Itanium design may yet succeed where brute force alone hasn’t been enough
Company’s technology will help extend the capabilities of IBM’s DB2 software for documents, images, digital media, and Web pages
Call-services specialist Rockwell tapped an outside QA specialist to nip potential application performance issues in the bud. It’s a growing trend.
Could the future of storage be in plastics?
Budget increases don’t necessarily translate into increased BI spending—not, at least, in the form of new projects or other initiatives
Oracle’s new CRM offering does little to address deficiencies in areas where the company trails its competitors
One analyst says Office has become a BI Trojan horse as Microsoft builds in more BI capabilities and more end users start to work with it.
More XP SP2 woes, fraud awareness survey, Can-Spam's failure
Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.
Understanding what the security templates can provide could be invaluable.
Big Blue also previews z/OS version 7, due out next year