Software


Manage the Breach or the Breach Will Manage You

Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond?

Risk Management Trends: 2011 and 2012

Risk is not an exact science, but there are specific trends that should impact decision makers in the year to come.

UTM Appliance Offered in “Light” Version for SMEs

SecPoint offering “light” version of Protector to small and midsize enterprises.

A 3-Step Plan for Social Media Data Integration

Social media is a rich source of data. These three steps will help you make the most of it in your environment.

Oracle Updates TimesTen In-Memory Database 11g

Release 2 improves performance, scalability for OLTP and analytics in-memory data management.

Exostar Updates Cloud-based Project Collaboration Service

Built on SharePoint 2010, ForumPass 5 improves secure, enterprise-class B2B collaboration.



Why Search-Based Applications are Set to Thrive

The enterprise search industry and search-based application space will see major steps forward in 2012 as recent acquisitions are sorted out.

The Data Model’s Role in Data Governance

Data models are an important part of your data governance program. We look at the Zachman Framework, which describes multiple levels of data models.

A Big Year Ahead for Big Data and Hadoop

During 2011, Hadoop became more reliable with better performance in new commercial distributions. In 2012, Hadoop will become easier to use and manage.

BI Experts: Good Data Strategy is Good Business Strategy

Director of TDWI Research David Stodder looks at three major trends that he sees shaping the development of data strategies.

CiRBA Updates Control Console for Virtual and Cloud Infrastructure

CiRBA Version 7.0 improves visualization, control over risk and efficiency for today’s dynamic IT environments.

How Lyza Learns from its Users

The new Lyza learns from how people use it and makes recommendations based on a user's role or interests. The more people who use it, the better, officials say.

Q&A: Data Strategies and Philosophical Dilemmas

We examine how creating a data strategy has philosophical implications, raising ethical questions about analytics and emphasizing the need for data governance.

BI 2012: The Future that has Already Happened

Eight current trends that yield insight into BI's future.

Ballmer Highlights Magical Microsoft Metro UI, Phones, Kinect in CES Keynote

Rehash of old news makes for uneventful presentation, Microsoft's last at CES (at least for the present).

F5 Keeps Android Users Connected, Safe with New Secure Access Solutions

F5 adds support for Android’s 4.x OS, enhances SSL VPN capabilities to help IT staff manage secure mobile access to data and services.

KEMP Technologies Accelerates Time-to-Deployment for App Load Balancing

Newest version of LoadMaster family offers pre-configured application templates for business, Web apps; adds DoS and SSL certificate features.

Three Trends Driving Data Security Strategies in 2012

In 2012, businesses must align data security with customer value.

Q&A: Solving VM Management Challenges

IT has used a mish mash of tools to manage VM. It's time to find something better.