Latest Technology News from the TechTarget Network
Wednesday, April 20, 2011
- SaaS solutions offer more security and soft savings than once thought
SaaS solutions provide better security and greater "soft" savings than was previously thought; but CIOs should heed concerns about vendor viability, integration and support.
- Verizon data breach report 2011: Attackers refining their targets
Attackers are choosing smaller targets with fewer protections in place. The value of account credentials and intellectual property on the black market is rising.
- Developing an information governance strategy: tips on getting started
Setting up an information governance program can be a daunting proposition. Read best-practices advice to help your information governance strategy get off the ground.
- Software code analysis firm gives security vendors poor marks
The latest study of application code by Veracode found many applications submitted by software makers are of ?unacceptable security quality.?
- Can genomics encourage use of personal health records?
Will personalized medicine -- specifically, patient genome sequencing -- drive adoption of PHR services? Dr. John Halamka makes the case at Bio-IT World.
- Considering application white listing
Application white listing is one of the oldest forms of end point security; vendors are working on improving application control implementations by adding trust models and reducing the management overhead.
- Get the most out of SAP BusinessObjects Web Intelligence, Xcelsius
SAP BusinessObjects Dashboards (Xcelsius) and Web Intelligence offer different ways to compile and share data to decision makers. Learn when to use each and why.
- Pancetera expands virtual machine backup capability
Pancetera Unite?s SmartMotion capability lets users push out data to any NAS target without the need for staging servers and virtual machine backup software.
- A new Cisco network management strategy: Cisco Prime
Cisco Prime, the new Cisco network management strategy and brand, comes with lots of promises about interconnected management products alongside hardware and support services.
- Shutting down a botnet, US Government disables Coreflood
Coreflood, a botnet almost ten years old, has been taken down by the FBI and US Department of Justice by obtaining permission to hijack the command and control servers and send a 'stop' command to infected PCs. Is this overstepping the privacy line?
- Information governance policy issue: Who owns a governance program?
An information governance program could be led by IT, the legal department or a business unit. And for many companies, ownership questions may not be entirely clear, analysts say.
- Building a multichannel contact center
Although IVR remains an integral part of contact center technology, social media use is growing. Find out how to manage multiple channels for the best ROI.
- Tips for supply chain analytics and manufacturing BI
Experts offer advice on matching business intelligence and supply chain analytics tools with the specialized needs of users, from operations to finance and the executive suite.
- SAS, Teradata strengthen in-database analytics with customer feedback
SAS Institute Inc. and Teradata Corp. continue mining feedback from their Product Advisory Council to create more efficient in-database offerings.
- ITIL and BYOD: Amicable relationship or irreconcilable differences?
BYOD, or bring your own device to work, is gaining ground, adding complexity to IT's job. Do frameworks like ITIL help or hurt? We talk to ITIL chief architect Sharon Taylor.
- Next-generation OSS platforms: Faster time to market for new services
A new survey correlates next-generation OSS platforms with faster time to market. With many carriers confounded by convoluted legacy systems, why have they been slow to upgrade?
- Cloud computing added to many 2011 IT budgets
Roughly 70% of IT shops made room in their 2011 budgets for some cloud computing, even though IT pros remain anxious about the usual concerns.
- Verizon data breach report 2011: Hackers target more, smaller victims
Seen as weaker targets, smaller organisations were more frequently the victims of attack, according to the Verizon Data Breach Report 2011 edition.
- As cyberattacks increase, so does need for penetration testing
The rise in cyberattacks highlights the need for robust penetration testing of government networks.
- Oracle: We have a hardware problem
Happy talk aside, slumping Sun server sales spook software superpower.
- STAREAST preview: Software testing with fuzzing and fault modeling - Interview with Shmuel Gershon
The real world isn't always like a test environment. How do we test for the unexpected problems such as system faults or malicious attacks? SSQ contributor Matt Heusser talks to Shmuel Gershon, who will be presenting at STAREAST with a talk titled, "Fuzzing and Fault Modeling for Product Evaluation." Read on to find out more about fuzzing and fault modeling and when they should be used.