Monthly Archives: February 2009

How to Fix Sales Forecasting with Revenue Performance Management

0
The eWEEK Knowledge Center recently published an article by contributor Joe Ruck on sales forecasting. While I agree with his diagnosis that forecasting is...

Netezza Purchases Data Auditing Vendor Tizor Systems

0
Data warehousing vendor Netezza announced Feb. 24 it has acquired data auditing and protection vendor Tizor Systems for an undisclosed sum.According to officials at...

Cisco, Accenture Partner on Data Center Solutions

0
Cisco Systems and Accenture are creating a business group designed to help businesses take advantage of emerging technologies such as virtualization, unified communications and...

IBM Buys White House Prescription for Health IT

0
After prying $19 billion for health care IT initiatives from lawmakers in the stimulus package, the White House indicated Feb. 23 that efforts to...
1

eWEEK Labs Takes a First Look at the Microsoft Azure Cloud Platform

0
eWEEK Labs Takes a First Look at the Microsoft Azure Cloud Platform by Jeff Cogswell New Project Types Azure Tools for Visual Studio create new project types...

OSGi Takes Off Among Enterprise Service Bus Providers

0
The Open Services Gateway Initiative Service Platform is catching on as a platform of choice for enterprise service bus solutions.The OSGi Alliance announced that...
1

eWEEK Labs Takes a Look at the Lenovo ThinkServer RD120

0
eWEEK Labs Takes a Look at the Lenovo ThinkServer RD120 by Matthew D. Sarrel Easy Access Removing the top of the server shows how well-designed it is...

Google Adds Billing to App Engine

0
Google announced Feb. 24 that the company has added billing to the Google App Engine cloud computing platform so developers can exceed the free...

Attackers Infect Ads with Old Adobe Vulnerability Exploit

0
Attackers infected some advertisements on the eWEEK.com Web site Feb. 23 in an apparent attempt to get readers to download a rogue anti-virus application....

How to Thwart Network Attacks with Two-Factor Authentication

0
A user keys in his password to log onto the network and his cell phone rings. If the user answers and keys in his...