Software


Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Q&A with SAS: The State of the BI Industry

Look for continuing consolidation (including a possible acquisition by SAS). The President and CEO of SAS also sheds light on packaged analytic applications, the convergence of production and analytic reporting tools, and the company's next version of its BI suite.

Case Study: Meeting Customer Demand for Secure Statements

Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.

Microsoft Says Security Improvements Coming

The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.

Salesforce.com Builds a Bridge to WebSphere

With sforce Toolkit for WebSphere, companies can tap WebSphere Application Server and WebSphere Studio Application Developer to build CRM solutions that integrate customer and sales information with their own applications.



Solving Application Problems: IT Still Stuck in Reactive Mode

Two-thirds of survey respondents say they typically aren’t aware of an application performance problem until an end-user calls the help desk. That method is costing IT big bucks—over half say downtimes exceeds $100,000 per hour.

How to Avoid Problems When Wireless-Enabling Your Application Infrastructure

From installation to security issues, experts offer suggestions for adding wireless access to your enterprise.

BMC Tweaks MainView, InTune

MainView enhancements support priority-based IP traffic pacing, FTP tracing and tracking features, and improved availability for CICS during upgrades.

Bringing Order to the Storage Universe?

Our recent column about historical revisionism and EMC brings immediate reader response.

Briefs

E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak

Virtual Data Warehouses: Beware Traditional DW Issues

Data federating technologies—ETL, EII, and EAI—are the Next Big Thing, reports META Group, especially where unstructured content is concerned, but the virtual data warehouse’s biggest selling point—direct access to "fresher" source data—could be overblown.

Case Study: Fielding Service Calls Securely

Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.

Teradata: Service Evaluates Alignment of BI Infrastructure with Business Goals

Data Warehouse Maturity Assessment service helps enterprises maximize DW and BI investments.

Effective Data Auditing for Regulatory Compliance: Options and Considerations

Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)

Alerts

Sarbanes-Oxley; partnering for security; security certification guide