Software


A Busy Month for Attackers

From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.

Analyst: Few Products Meet Rigorous Enterprise ETL Requirements

Enterprise ETL tools must address scalability, developmental, connectivity, and availability requirements

In Brief

Windows XP security best practices, better SAML administration

Q&A: UDS—Informatica's Plug and Play Solution

Bottom line: IT can spend less time interacting with the business and more time dealing with strategic problems

DumpSec's Shortcomings Mask the Full Security Picture

Don’t let DumpSec fool you into a security comfort zone

BI Vendors Respond to Demand for Compliance Features

New BI enhancements pass regulatory-compliance muster

Best Practices: Securing IM Against Attacks

Free instant messaging services are just one of the many security holes facing corporate IT



IT Turns to SMTP-Level E-mail Blocking

New approaches focus on stopping unsolicited e-mail before it's even received

IBM Announces Power5 for pSeries

Power5 and new AIX 5.3 bring multi-threading, enhanced virtualization to pSeries

Agent-less Appliance Identifies Application Performance Problems

NLayers' Insight creates application behavioral models to help organizations optimize and cut costs

Content Management Systems Ease Web Updates for Non-Technical Users

CMS software enables end users and subject matter experts to keep Web content fresh and accurate

Readers Sound Off on T-Bits and B-Bits

Our column on actual vs. real disk space touched quite a nerve