Columns: Dev How-To and Advice


Shrink-wrapped ETL is on SQL codejockeys’ short list

What do IT organizations have on tap business intelligence-wise in 2006? A whole lot of SQL Server 2005, for starters: With so much pent-up demand, many SQL shops will make the move to Microsoft's next-gen database this year.

Energy company puts juice into monitoring IM

Is your company's use of instant messaging secure? Does it meet regulatory requirements?

Manage e-mail and IM info-glut

As the use of e-mail and instant messaging for business communications has grown, so too has another problem: storing and managing that content.

We Have Trends of Our Own

Regular readers of Application Development Trends know we cover more of the application scene than development, despite the name. We regularly run articles on apps management, integration, innovation and more. That’s why, starting with next month’s issue, we’ll be operating under a new moniker: Application Trends. We’ll show off our new logo and tell you all about the name change in the January issue.

The buzz about operational biz intelligence

You can’t say Information Builders CEO Gerry Cohen doesn’t speak his mind. You might be tempted to call him a straight shooter. For example, even though IBI is sitting on one of the niftiest data integration technologies on the market—its iWay family of connectivity solutions— Cohen dismisses data integration as an over-hyped buzz term.

Bits & Bytes

Insight, analysis and stuff for managers

Online Treasure Chest for Security Pros

Developers tracking the latest product vulnerabilities now have a central location to check—the National Vulnerability Database.

OutputLinks Searches for Precise Results

The results from an OutputLinks search used to be extensive—but cluttered—for users. More often than not, users waded through lots of findings for one piece of pertinent information.

Security, Computer Crimes Still Bane of IT

Robert Richardson is the editorial director of the Computer Security Institute, which provides training to computer, information and network security professionals. A recent survey by CSI, along with the FBI’s Computer Intrusion Squad, focused on computer crimes and security. During an interview with ADT, Richardson examines how companies are tackling these issues.

Hunter Dickinson Finds Security with Cirond

Employees at Hunter Dickinson clamored for wireless capability so they could easily work from its worldwide offices in South Africa, Tibet, Mexico, Chile and Canada. But Hunter Dickinson’s Anthony Maw was leery about implementing wireless capability in the company’s infrastructure.