Software


Q&A: Eradicating Spyware in the Enterprise

Finally there's software to let enterprises remove spyware.

DataFlux Ships New Data Quality Suite

New data monitoring component to assist validation, compliance efforts

Briefs

Microsoft details vulnerabilities (including extremely critical IE problems); safeguarding CAD drawings in your browser

New Spin on an ETL Best Practice

New data extraction tool boasts .NET underpinnings, OLE DB, RSS support

IBM Snags AlphaBlox

Acquisition seen as consistent with Big Blue’s middleware-centric BI strategy

Case Study: Managing Zip Files with Security Controls

System vulnerabilities can creep in through compressed files. But does completely blocking their use make for good security policy?



Top 10 Control Points For Your Local SAM

Forgetting to audit your local SAMs can prove disastrous

Q&A: HP – Recasting Windows as a Giant-Killer

The new system is being promoted as an extensible platform capable of hosting for Windows Server 2003 Datacenter Edition, HP-UX, Linux, and even OpenVMS workloads

IT Showing More Signs of Recovery

IT budgets, developer headcount is growing; study says outsourcing isn't dampening internal development

Why Traditional SLAs Are No Longer Adequate

SLAs have traditionally relied on operating system utilities to determine process availability -- but their accuracy isn't assured. Measuring the availability of business processes may hold the key to correct application performance assessment.

Database, BI Solutions Drive Grid Growth in the Enterprise

Grid computing finds enterprise killer apps

You Had Me At I/O: A Love Story

The time for application-centric storage performance monitoring is now