Latest Technology News from the TechTarget Network
Friday, March 18, 2011
- Synchronizing the analytical MDM process with operational systems
Is analytical master data management just a starting point for enterprise MDM? Get consultant William McKnight?s take on the relationship between analytical and operational MDM.
- Ex-Goldman Sachs programmer gets eight years in prison for code theft
Former computer programmer snatched code for the firm?s proprietary trading platform on last day of work.
A dangerous vulnerability affecting the BlackBerry browser can be used to gain access to sensitive data or steal the phone's contact list and image database.
- Should HP buy Salesforce.com?
What can HP do to gain instant credibility in the cloud application market? Well, the server giant could shell out billions for Salesforce.com?
- New IT risk management standard helps enable MDDS compliance
HIPAA compliance and Medical Data Device Systems compliance start with health IT risk management. The IEC 80001 risk management standard offers some guidance.
- With search-based applications, the real action is behind the scenes
Search-based applications use embedded enterprise search software to help business users find information ? often without them even knowing that searches are taking place.
- ERP customization boosts software value, but beware runaway costs
Panorama Consulting?s new survey of ERP implementers suggests customization may be key to ERP satisfaction -- if expectations are properly calibrated upfront.
- Tyre pressure firm pumped for Microsoft Hyper-V virtualisation project
Schrader Electronics spends ?575,000 on Microsoft Hyper-V virtualisation project; plus more news in brief.
- How three firms moved to Microsoft, Oracle and storage in the cloud
Find out how three IT shops chose cloud computing paths and the common thread between them. Here's a hint: cost played a significant role.
- RSA SecurID breach fallout should be limited, experts say
Experts say the risk of an attack that exploits stolen proprietary data on RSA's SecurID products is low, but it can't be completely dismissed until attack details are revealed.