Software


Careers: Hiring Freeze

Just nine percent of CIOs say they plan to hire new IT professionals next quarter, while four percent expect further cuts.

NuView Sequels Keep Coming

StorageX answers a specific problem with a good solution. But how can the company cope with a niche solution that refuses to remain just a niche solution?

Vulnerabilities: IE Cross-Domain Security Flaw, Database Component Exposure

Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code

Cognos Ships Revamped Scorecarding Product

Metrics Manager version 2 improves flexibility, provides more relevant information to users

Intuit Joins CRM Fray

Company best-known for Quicken and TurboTax expected to announce a shrink-wrapped customer relationship management application.

SAS and eSecurity Deliver Security Analytics

New joint solution collects, correlates and normalizes data from nearly 200 different security sources, allowing customers to perform historical trending and analysis to detect attack signatures, potential incursions, and other anomalies.

Best Practices in Security Training

Worms and legislation dictate the need for security-savvy employees; here's how to train them and reinforce human nature.



Sobig Lives Up to Its Name

It's been a banner month for viruses, as new vulnerabilities were unleashed and others lingered

IBM Entices Customers to zSeries

IBM announced it will offer customers significant new incentives—including dramatically reduced software license costs and zSeries rebates—to move non-traditional mainframe applications

Q&A: IBM Talks Power5

With Power5, IBM introduced Simultaneous Multithreading, in which each of the processors on the chip looks to the software like two processors. The technology offers 40 percent more performance.

SCO Update: Users Say They'll Stay the Course

Though SCO disclosed examples of copyrighted code in Linux, most users were unimpressed, and few say they'll change their plans—for now.

SAP Server Consolidation: Consider Linux, Analyst Says

zSeries/SAP consolidation offers cost savings and performance potential that enterprises should consider, Sageza Group reports

Hitachi Data Systems' Hu Yoshida Looks Ahead

The author of a foundational white paper is struggling to figure out what the storage utility model really is.

Worm Continues Blast Across Internet

Worm exploits RPC/DOM vulnerability; denial-of-service attacks still likely

Grids: Large BI Data Sets, Low Price

Grids offer an inexpensive alternative for processing terabytes of BI data

Passwords and Identity: Seeking Synergy

Do password management software and identity synchronization software naturally go together? One thing's for sure: the ROI for both categories is attractive.

The Most Important Technology Vendor You’ve Probably Never Heard Of

SSA's acquisition of EXE Technologies will enhance its supply chain management and execution functionality, officials say

Alerts: BSD and Postfix Vulnerabilities; File-Sharing Dangers

New vulnerabilities in BSD operating system and Postfix, a popular mail transfer agent; the FTC warns about the dangers of file-sharing

SuperGlue: A Sticky Solution for Meta Data Management

Informatica is betting product will form tight bond with customers

Why So Many BI Initiatives Fail

Balanced scorecards may help align what BI projects deliver with the strategic and operational information business users really want.