Software


7 Steps for Dealing with the People Component of Data Security

We outline seven steps that help you address the people aspect of data security.

Survey: Capturing Requirements is Top Agile "Pain Point"

Going Agile shifts the focus of gathering application requirements from detailed specifications to user stories, and that's the biggest obstacle to success, according to a recent survey of companies making the leap.

Micro Focus Introduces New COBOL Development Environment

Visual COBOL R3 includes Eclipse integration, Windows Azure deployment capability, Java interoperation.

Scyld ClusterWare Gets SUSE Linux Enterprise Support

Driven by increasing demand for SUSE Linux Enterprise Server in HPC

RhoSync App Integration Server Adds SalesForce Source Adapters

New version features robust analytics in management console

Workload Replay Feature Added to Database Performance Test Tool

Benchmark Factory for Databases simplifies testing, safeguards database performance

Q&A: Combining Search with BI Yields Powerful Results

Endeca chief strategist Paul Sonderreger talks about combining search and BI to help people find what they need and understand what they’ve found.



Data Virtualization and NoSQL Data Stores

Big Data is increasing the popularity of NoSQL where SQL is not the primary processing language. The challenge: integrating disparate NoSQL systems.

The BI Revolution: The Rise of the BI Builder

How BI builders will help make BI more pervasive, delivering that “last mile” of capability where no one else can.

Creating a Business-Relevant Data Strategy

Three keys to building your data strategy.

Q&A: Keys to Data Governance Success

The surge in interest in data governance points to increased need to manage data better. Why do enterprises still struggle when implementing a governance program, and what can they do to fix the problem?

New Year, New Threats: The Emerging Security Risks of Social Networking

Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.

Big Iron in a Class by Itself

What’s the most reliable server operating platform of them all? If you answered z/OS, you’re right. The rest of the tally might surprise you, however.

Q&A: Data Protection Strategies for Mobile Computing

Best practices for protecting your mobile and enterprise assets.

Virtualization 2011: Collaboration with Network Infrastructure

Enterprises are striving to increase server virtualization this year. The maturity of server virtualization will help drive the planning of your network strategy; another is desktop virtualization.

Top 10 Questions Data Center Operators Must Answer in 2011

With the rising costs of energy and increasing pressure on organizations to be more "green," implementing a DCIM and/or DPO solution is inevitable.

Making Sense of Contract Management

Contract lifecycle management solutions can provide greater insight and control over contractual obligations; helping companies to manage risks and increase profits.

Symantec Releases Standalone Backup, Client and Target Deduplication, and Storage Appliance

Symantec NetBackup 5200’s data protection reduces growing data stores, eases deployment

Spam Takes a Holiday

Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?

Best Practices for Storage Management in 2011

These strategies will help you manage your growing storage needs in 2011.