Software


Storage Management: It’s All About the Price Tag

Customers say management features for heterogeneous storage should be a "given"—built-in (and free). Vendors say it's an add-on worth paying for. When will vendors wake up?

Case Study: Choosing Outside Help to Meet Security Regulations

Finding just the right provider can be tricky. How one company made its decision.

Case Study: A Single Version of the Financial Truth

For BJ’s Wholesale, Hyperion’s Essbase OLAP server makes for happier—and more productive—end users

Q&A: Actuate—A View From the Top

Actuate's CEO discusses consolidation, integration, and cooperation, and his company's recent successes in the BI marketplace



Protecting Customer Data at the Browser Level

Once information appears in a browser, users can copy or print it as they please. Security managers have a new option for safeguarding such content.

Trillium First to Offer Data Quality Solution for Oracle’s Customer Data Hubs

Address validation for Oracle E-Business Suite 11i.9 now possible, but only on Windows and Unix platforms for now

Tools to Secure Your System, Privacy, and Sanity

How can you know you haven't been connected to a look-alike server, and how does it know your device isn't infected with malware? New hardware specification models from the Trusted Computing Group may help.

Storage Provisioning with Blade Servers

Direct-attached hard drives in servers are problematic. ISCSI SANs may be the solution.

Cisco’s New CRS-1 Router Can Handle It All

Don’t expect to bring home a CRS-1 for less than a half million dollars

Q&A: Taking the Pain Out of Sarbanes-Oxley Compliance

Sarbanes-Oxley compliance needn’t be a backbreaking ordeal

Careers: Little Change Ahead in IT Staffing Levels

Most companies won’t make any changes to their IT staff levels, but those that do expect to add jobs, not cut them. Survey shows what skills are most in demand—and where the jobs are located.

The Little Guy: Squeezed Out of SMI-S Land?

Can smaller vendors still have a voice in an organization designed to develop hardware standards for the entire industry?

Quantifying the Threat from Insiders

Your greatest security risk may not come from outside attacks but from your own employees. Setting policies and procedures aren't enough to stop the problem, but new security event management technology can help.

SCO Identity Manager Supports Single Sign-on Across Environments

A new Microsoft initiative eases management headaches by building management features into products that can be accessed by a variety of enterprise management tools. SCO's Vintela Authorization may give us a glimpse into how Microsoft networks can finally play nice with other operating systems.

Reinventing the Call Center

In the era of Do Not Call, predictive analytics can turn inbound calls—even complaints—into potential sales

Business Objects Reaches Out to Office

Meanwhile, Microsoft builds bridges between Office and BI application vendors