New "address book policies" features helps IT pros divide e-mail connections into subsets.
Written report includes a scorecard of the organization’s mobile security readiness, detailed findings and recommendations, and prioritized action plans for closing existing gaps.
Enhanced ExtractWizard functionality supports latest versions of Microsoft Exchange, Microsoft SharePoint, leading backup providers.
IT is demanding that the tools it uses provide higher levels of automation. What automation will we see in 2012?
Key events in cloud computing this year, and three predictions for its growth in 2012.
Company mum on rumors on Windows 8 plans.
Over 30 updates to Office 365; SkyDrive gets "app-centric"
Too many business executives lack not only good data, but an understanding of the data’s origination and history.
Although an enterprise data model (EDM) can be used to facilitate messaging (as described in Part 2 of this series), this way of using an EDM does not achieve the same results that would be achieved by using the EDM to instantiate databases.
How your BI team can communicate your focus on delivering solutions rather than the use of tools and technology.
Enables developers to create modern, composite apps for mobile, Web, and SOA deployments.
What do you do when you have data but insufficient data analysis skills? You find a guide -- and surprises as a result.
Bank of America, Comcast, and other shops are using data virtualization to support applications, services, and initiatives.
This year we’ve seen the emergence of HTML5 and the popularity of tablets. What will 2012 bring to the BI mobility market?
While the economy struggles, demand for BI experts and software shows robust growth -- yet BI adoption has been flat. We explore this and other findings from a new survey by Cindi Howson.
A look back at the leading mobility trends of the year, and three predictions for 2012.
What's it take to get hired in IT these days? Skills, for starters.
Enterprises are increasingly being targeted by complex attacks designed to bypass existing safeguards.
Our pros and cons list will help you sort out the issues relevant to your situation and select the right cloud model -- public, private, or hybrid -- for your environment.
Mainframes are typically more secure than most other platforms, but that doesn't mean IT can ignore them.