Seapine Software has released a new version of Surround SCM, a software change management solution. Version 4.0 has been upgraded with features such as WebDAV and Unicode support, improved branch management and enhanced reports.
It’s not going to come as a surprise to most IT execs, but according to Book of Numbers research from The Hackett Group, enterprises can reduce the cost of HR by reducing the complexity of key HR processes, programs and technology.
Interwoven, an electronic content management solutions provider, says it has expanded its relationship with Sun Microsystems under which Sun will resell the Interwoven ECM platform.
Trader Publishing was struggling with having to manually track the sales of its more than 400 publications in 73 sales markets throughout the U.S. Trader prints classified advertising and photo advertising magazines such as Auto Trader, Parenthood, Harmon Homes and Employment Guide.
Netuitive will introduce next week a business service management (BSM) application that is the first to be self-learning, self-configuring and adaptive, according to Nick Sanna, the company’s CEO.
“Viruses are bad and worms are worse, but these broad types of attacks just aren't having the same negative financial impact on the enterprise as the growing number of targeted attacks against the application layer," says John Pescatore, an analyst at Gartner.
eBusiness Applications recently introduced a new version of Web ComboBox, its AJAX-based enterprise software component, which allows developers to build applications featuring on-the-fly data retrieval from Web pages.
When it needed a tool to develop applications for both Windows and Unix platforms in the early 1990s, ELSNET, the European network in human language technologies, discovered MKS Toolkit and has never looked back, according to Steven Krauwer, project manager.
IBM has launched a new program to provide university students and faculty free access to nascent technologies on its alphaWorks site.
It has been almost 22 years since AT&T’s Bell Laboratories spawned its first transaction processing monitor, technology that evolved into BEA’s Tuxedo system.
Over the past 6 months, the number-one question IBM’s customers have asked about service-oriented architectures has shifted, says Sandy Carter, IBM’s VP of WebSphere strategy, channels and marketing, from “What is it?” to “How do I get started?”
In the face of Gartner figures that show the high cost of turning a Cobol programmer into an object-oriented developer, integration vendors offer a different solution. A better route, they say, is exposing the business processes in legacy applications, keeping the core of the application intact.
Rogue Wave Software recently introduced a new version of its LEIF framework that features app dev tools to incorporate business logic in different formats.
Application security must be the top priority for developers and business throughout the product development lifecycle. That was the gist of Symantec’s recent Webcast, “Securing the Development Phase of the Application Development Lifecycle.”
IBM has released two new blogging tools with features geared to the enterprise.
Much discussion about IT security centers around the idea that developers should build secure applications. It makes sense; more than ever, attackers are targeting vulnerabilities in the application layer. But in an increasingly service-oriented world, in which monolithic applications are being broken down into smaller pieces for reuse, is it practical to expect developers to code security into individual Web services?
Panacya recently released BoxTone 2.0, which features end-to-end visibility into several e-mail environments, including Microsoft Outlook and Exchange, and BlackBerry, the company says. It builds models of complex e-mail flows, including SMTP, Outlook and Exchange, Exchange-to-Exchange and BlackBerry, within an enterprise and across external service providers.
Hitachi Data Systems recently introduced a midrange storage array with storage
virtualization features for small and mid-size customers seeking more capacity
but lacking the required staff and data center infrastructure.
Microsoft is set to ship its first disk-based continuous data backup and recovery solution. The System Center Data Protection Manager (DPM) is designed to back up data on Windows file servers and network-attached storage (NAS) devices as a series of up to 64 snapshots.
With internal auditors breathing down their necks over compliance and security issues, many large companies are eager for help organizing IT operations infrastructure. That helps explain the mushrooming popularity of the Information Technology Infrastructure Library.