Data Encryption
Published: 18th April 2008 | By: Nigel Stanley
Encryption is the process of taking a piece of data (the plain text) and obscuring it so that unauthorised people cannot view the original information (this is called cipher text).
Master Data Management
Published: 12th April 2008 | By: Andy Hayler
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
RFID Anywhere from Sybase iAnywhere
Published: 11th April 2008 | By: Simon Holloway
Sybase iAnywhere has engineered a very compelling product to support the middleware functionality in RFID and sensory management applications.
Open-Tec CStore Content Archive
Published: 4th April 2008 | By: Peter Williams
There are as yet no direct competitors in this niche, yet it addresses a growing requirement. CStore has major disruptive market potential.
What’s cool about columns
Published: 29th March 2008 | By: Philip Howard
Columns provide better performance at a lower cost with a smaller footprint: it is difficult to understand why any company seriously interested in query performance would not consider a column-based solution.
CA Application Quality Management and Testing Tools
Published: 28th March 2008 | By: David Norfolk
This white paper examines CA's family of application quality assurance and testing tools (its AQM&TT product set)
(Complex) Event Processing
Published: 26th March 2008 | By: Philip Howard
This paper seeks to explain what events are, why they are important to your business, and what the options are for processing and managing these events.
Network and Voice Management Software
Published: 20th March 2008 | By: Peter Williams
We cannot overstate the importance of an integrated toolset for seamlessly managing and supporting the whole enterprise network and voice infrastructure.
Amalto b2box
Published: 10th March 2008 | By: Simon Holloway
Amalto b2box looks a winner. Its appeal to the mid market, to which it is targeted, is its simplicity to install and use plus the benefits to be gained in more flexible and agile processes
Protecting Enterprise Data on the Endpoint - a strategic approach
Published: 6th March 2008 | By: Nigel Stanley
Undoubtedly the nature of endpoint protection is changing, fuelled by the increase in numbers and types of endpoints and the constant evolution of new threats.