Monthly Archives: June 2005
Spyware Danger Meets Rootkit Stealth
The makers of one common spyware program are borrowing techniques from another type of malicious program, known as "rootkits," to help evade detection on...
Oracles Fusion Evolution
With the goal of finding common ground, assuaging fears and moving forward post-PeopleSoft Inc. acquisition, last weeks Oracle Application User Group annual conference in...
Oracles Fusion Council to Steer Integration
After an intense 18-month battle that brought some bitter recriminations from PeopleSoft customers, Oracle in December 2004 succeeded in acquiring its rival PeopleSoft. With...
CA Releases End-to-End Data Protection for SMBs
Offering security, simplicity and ease, Computer Associates has expanded the release of five Protection Suites aimed at small and midsize businesses.
The goal, according to...
SAP Lures 200 Rival Employees, It Says
After news leaked Friday that SAP AG had hired some major talent away from its rivals, the company officially announced Monday that it has,...
Regional Pricing Should Be Slashed Into Oblivion
Sometimes, pushing the technology envelope is simply not worth it. The thought leaders tend to get criticized for the flaws of the new approach...
HP Boosts Grid Storage Across Linux Clusters
One year after the products initial release, Hewlett-Packard this week is launching a new version of its revamped HP StorageWorks Scalable File Share appliance...
Big Issues Facing Little Enterprises
For small and midsize businesses, everything comes down to productivity, efficiency and the bottom line. This specifically rings true for technology adoption.SMBs are the...
American Censors in China
Should American companies help China filter the Internet? Thats a question that came up twice in my life over the past week. In one...
Web Conferencing Isnt Exactly Collaboration
At next weeks Collaboration Technology Conference in New York, one session is titled "Conferencing Applications: Are They Becoming Commodities?"
The answer is a resounding yes....