Perhaps it is time to begin buying storage on the basis of business value.
China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.
How to create and maintain an effective security program through auditing.
It's been over two years since the last revision, and analysts say the new version simply makes the product competitive. However, Unicode support could be critical to expand SAP's user base.
Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.
Version 7 features new Web services-oriented architecture and supports for LDAP and CWM
Acquisition of DataDistilleries makes sense, as products are highly complementary.
Security vendor Symantec offers best practices for staying in compliance with the Gramm-Leach-Bliley Act.
How do you know when your BI project's a success? One measure: users who welcome the BI solution and start using it enthusiastically. Yet so many BI projects fail to meet expectations. We offer ten key steps—from getting the right sponsor and project champion to developing the right training and support—to help ensure your BI project solution is a success.
Though 96 percent of techies say they want to work from home at least part time, (according to a techies.com survey), their top priorities are much different. IT workers are influenced much more by f
One leading research firm says that enterprises need to actively investigate their reporting solutions and determine whether they comply with three key areas of Sarbanes-Oxley legislation.
In a seemingly endless series of leapfrogging announcements, HP reveals record-breaking server performance over IBM
Automation is the real key to real-time infrastructure, and today’s infrastructure is anything but real time. The solution: Gartner analysts tout a technology vision that centers on a dynamic, two-way relationship between IT and business processes. Gartner also identified three technology triggers required to achieve this new business process fusion.
Novell's track record with high-profile acquisitions is spotty, but users we spoke to believe IBM's $50 million investment in Novell is encouraging.
Analyst firm says the waiting is over: IT spending is about to come back into line after two horrible years of IT budget declines.
A new supercomputer with blistering performance of 60Teraflops running on standard Intel x86 processors?