U3 is touting its computing platform for USB smart drives which is set to launch in September with the introduction of U3 smart drives and U3 smart apps.
Arbor Networks is introducing an anomaly detection and internal intrusion prevention system that traces inappropriate behavior back to users—down to their names.
Software AG recently released its Event Applicator for Adabas, a data-replication publishing tool that pushes changes to other databases and applications in real time.
The shift from per-CPU software licenses to per-user and subscription models is well under way, according to industry analysts, but a new generation of dual-core processors, which has been a driver of this trend, is sparking new concerns about customer compliance with older licenses.
New features were recently added to Sleep, an embeddable scripting language for Java applications. Developers use Sleep to design domain-specific languages for their applications.
IBM is participating on a limited basis in Project Harmony, the Apache Software Foundation's effort to create a compatible, independent implementation of Java Standard Edition 5 under the Apache License.
Seapine Software has released a new version of Surround SCM, a software change management solution. Version 4.0 has been upgraded with features such as WebDAV and Unicode support, improved branch management and enhanced reports.
It’s not going to come as a surprise to most IT execs, but according to Book of Numbers research from The Hackett Group, enterprises can reduce the cost of HR by reducing the complexity of key HR processes, programs and technology.
Interwoven, an electronic content management solutions provider, says it has expanded its relationship with Sun Microsystems under which Sun will resell the Interwoven ECM platform.
Trader Publishing was struggling with having to manually track the sales of its more than 400 publications in 73 sales markets throughout the U.S. Trader prints classified advertising and photo advertising magazines such as Auto Trader, Parenthood, Harmon Homes and Employment Guide.
Netuitive will introduce next week a business service management (BSM) application that is the first to be self-learning, self-configuring and adaptive, according to Nick Sanna, the company’s CEO.
“Viruses are bad and worms are worse, but these broad types of attacks just aren't having the same negative financial impact on the enterprise as the growing number of targeted attacks against the application layer," says John Pescatore, an analyst at Gartner.
eBusiness Applications recently introduced a new version of Web ComboBox, its AJAX-based enterprise software component, which allows developers to build applications featuring on-the-fly data retrieval from Web pages.
When it needed a tool to develop applications for both Windows and Unix platforms in the early 1990s, ELSNET, the European network in human language technologies, discovered MKS Toolkit and has never looked back, according to Steven Krauwer, project manager.
IBM has launched a new program to provide university students and faculty free access to nascent technologies on its alphaWorks site.
It has been almost 22 years since AT&T’s Bell Laboratories spawned its first transaction processing monitor, technology that evolved into BEA’s Tuxedo system.
Over the past 6 months, the number-one question IBM’s customers have asked about service-oriented architectures has shifted, says Sandy Carter, IBM’s VP of WebSphere strategy, channels and marketing, from “What is it?” to “How do I get started?”
In the face of Gartner figures that show the high cost of turning a Cobol programmer into an object-oriented developer, integration vendors offer a different solution. A better route, they say, is exposing the business processes in legacy applications, keeping the core of the application intact.
Rogue Wave Software recently introduced a new version of its LEIF framework that features app dev tools to incorporate business logic in different formats.
Application security must be the top priority for developers and business throughout the product development lifecycle. That was the gist of Symantec’s recent Webcast, “Securing the Development Phase of the Application Development Lifecycle.”