When it comes to mobile devices, why do so many companies avoid the security issues?
From newsletters to user surveys, making your IT department more visible to end users offers big rewards
Mercury Interactive's new Resolution Center encapsulates expertise for first-tier help desk personnel
IBM says its HATS tool can quickly expose mainframe applications to the Web
The author outlines 10 reasons why he disagrees with the FCIA's view of FC SANs
SAS makes its formal debut as an end-to-end BI player
A British market research firm reports that the software giant had the leading—but not dominant—OLAP market share last year, despite selling an old product
Sneaking vulnerabilities into the enterprise through encrypted attachments pose new problems; ISPs will spend $245 million this year to combat problems, in large part because of home users.
Using pattern matching with information taxonomy tools to track sensitive information leaving the company
Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.
Companies using spreadsheets alone can spend five months or more on budgeting and planning than those who use spreadsheets with other planning and budgeting tools, analyst says.
Rather than moving host applications off the mainframe to save money, analysts suggest that it's time to look into service-oriented architecture
While the distance limitations of the technology remain unchanged, vendors have been demonstrating that extended-distance clusters can work