Software


Rethinking Security/Network Boundaries

IT is reassessing how network administrators and security personnel can work together more effectively

2004 Salary Survey, Part 2: IT Middle Managers Feel the Pain

Salaries and bonuses for IT executives fell on hard times in recent years. Compensation is down in half of the positions surveyed.

Lack of IT Guidance Hinders Compliance Efforts

Continued use of legacy environments may result in charges of negligence



Careers: Hot Skill Areas You Can Bank On (Part 3 of 3)

You don’t have to be certified to enjoy job security -- demand for many uncertified skills is up

T-Bits vs. B-Bits: What You Need to Know

Think you're getting the space your storage vendor says you're getting? Think again.

Q&A: New Technology For Encrypting Sensitive, Stored Data

New approaches make it easier than ever to add network-wide transparent data encryption

SAS Teaches Its Old Analytics Dog Some New Tricks

WebHound learns to fetch, correlate customer click-through conversation rate

Security Briefs

Vulnerabilities target mobile devices, RealPlayer; Tivoli adds .NET support

Actuate 8 Takes Spreadsheets to the Next Level

Company touts new release as a “silver bullet to kill feuding spreadmarts”

Four Criteria for Evaluating a Security Vendor

When evaluating security products for your enterprise, make sure you also evaluate the vendors themselves using these criteria.

Microsoft Tightens Ties Between Office, CRM

Software giant to leverage ubiquity of Office 2003 in upcoming CRM release