Social media is a rich source of data. These three steps will help you make the most of it in your environment.
Mobile devices will be a way of life for your enterprise users. What changes in mobile IT can you expect and prepare for this year?
Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?
SecPoint offering “light” version of Protector to small and midsize enterprises.
Release 2 improves performance, scalability for OLTP and analytics in-memory data management.
Built on SharePoint 2010, ForumPass 5 improves secure, enterprise-class B2B collaboration.
The enterprise search industry and search-based application space will see major steps forward in 2012 as recent acquisitions are sorted out.
CiRBA Version 7.0 improves visualization, control over risk and efficiency for today’s dynamic IT environments.
We examine how creating a data strategy has philosophical implications, raising ethical questions about analytics and emphasizing the need for data governance.
Eight current trends that yield insight into BI's future.
Rehash of old news makes for uneventful presentation, Microsoft's last at CES (at least for the present).
F5 adds support for Android’s 4.x OS, enhances SSL VPN capabilities to help IT staff manage secure mobile access to data and services.
Newest version of LoadMaster family offers pre-configured application templates for business, Web apps; adds DoS and SSL certificate features.
Data models are an important part of your data governance program. We look at the Zachman Framework, which describes multiple levels of data models.
During 2011, Hadoop became more reliable with better performance in new commercial distributions. In 2012, Hadoop will become easier to use and manage.
Director of TDWI Research David Stodder looks at three major trends that he sees shaping the development of data strategies.
The new Lyza learns from how people use it and makes recommendations based on a user's role or interests. The more people who use it, the better, officials say.
In 2012, businesses must align data security with customer value.
IT has used a mish mash of tools to manage VM. It's time to find something better.