Software


Passing the WLAN Security Buck

Company offers outsourced wireless LAN to overcome security vulnerabilities

Q&A: Itanium – Succeeding Where Brute Force Alone Isn’t Enough

A cooler, more flexible, and more powerful Itanium design may yet succeed where brute force alone hasn’t been enough

Big Blue Snaps Up Venetica for Unstructured Content Management

Company’s technology will help extend the capabilities of IBM’s DB2 software for documents, images, digital media, and Web pages

Case Study: A Fresh Perspective on Application Performance

Call-services specialist Rockwell tapped an outside QA specialist to nip potential application performance issues in the bud. It’s a growing trend.



My Dog Ate My (Storage) Home Work

Could the future of storage be in plastics?

BI Budgets: Up, Up, and Away

Budget increases don’t necessarily translate into increased BI spending—not, at least, in the form of new projects or other initiatives

Oracle Revamps Sales-Side CRM Application

Oracle’s new CRM offering does little to address deficiencies in areas where the company trails its competitors

Microsoft’s Office: A BI Trojan Horse?

One analyst says Office has become a BI Trojan horse as Microsoft builds in more BI capabilities and more end users start to work with it.

Briefs

More XP SP2 woes, fraud awareness survey, Can-Spam's failure

CA Jumps into Anti-Spyware Market

Acquisition of PestPatrol signals single-console management of viruses, spam, and spyware may not be far away.

Top Six Settings in Windows Security Templates

Understanding what the security templates can provide could be invaluable.

IBM zAAPs z/OS Upgrade with Speed, Improved Scalability

Big Blue also previews z/OS version 7, due out next year