The Big Picture, from WhatIs.com

Friday, March 17, 2006

TechTarget News Update -- March 1, 2006

SearchAppSecurity.com:
Threat modeling key to pro-active security
http://searchappsecurity.techtarget.com/originalContent/0,289142,sid92_gci1169779,00.html
The best way to ensure software is secure is to build security into the software development life cycle, industry experts say. Design-time threat modeling is pivotal, but it needs to be constrained by an understanding of the business risks involved.

Metrics needed to guide application security decisions
http://searchappsecurity.techtarget.com/originalContent/0,289142,sid92_gci1169794,00.html
Recently launched Application Security Industry Consortium aims to give companies and their developers the information they need to select secure software and ensure products meet their business goals.

SearchCRM.com:
Is IBM the real winner in the CRM SaaS wars?
http://searchcrm.techtarget.com/originalContent/0,289142,sid11_gci1169996,00.html
Through partnerships with the top on-demand CRM providers, IBM is clearly positioning itself to take advantage of SaaS popularity.

SearchDataManagement.com:
Expert advice from professional negotiator and author, Herb Cohen (Q&A) http://searchdatamanagement.techtarget.com/qna/0,289202,sid91_gci1169686,00.html
Expert negotiator, bestselling author and keynote speaker at the Gartner BI Summit, Herb Cohen, shares the secrets of successful negotiations in technology projects -- and in life.

Eight must-ask questions for CDI projects
http://searchdatamanagement.techtarget.com/originalContent/0,289142,sid91_gci1168278,00.html Jill Dyche asks -- and answers -- these important questions for companies considering, planning or implementing customer data integration systems.

SearchNetworking.com:
Monitoring goes out-of-band
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci1170000,00.html
A new data access switch from Gigamon boosts the number of SPAN ports on the network for out-of-band monitoring.

SearchOpenSource.com:
Top five tips for understanding virtualization
http://searchopensource.techtarget.com/originalContent/0,289142,sid39_gci1169991,00.html
As virtualization on x86 architecture heats up, IT managers need to have a complete understanding of the technology before they get swept away by the hype

SearchSecurity.com:
Future CISOs need a 'softer side'
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1169789,00.html
Experts weigh in on what it now takes to move beyond a cubicle to the C-suite, and it isn't delving even deeper into manuals and schemas.

IBM and friends tout open source ID management
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1169857,00.html
Big Blue is teaming up with Novell and others on Project Higgins, an open source project to simplify and secure Internet ID management.

SearchStorage.com:
MIT Medical picks Compellent SAN over Clariion
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci1170018,00.html
MIT Medical chooses Compellent's Storage Center SAN over an EMC Clariion AIX 100 from Dell, despite historically being a Dell shop.

SearchWinIT.com:
Microsoft mends minor scripting problems in Monad
http://searchwinit.techtarget.com/originalContent/0,289142,sid1_gci1169896,00.html
The fixes apply to Microsoft's Monad scripting language for the beta 3.1 version. Monad is due to make its first appearance in Exchange 12 later this year.

Microsoft announces another IE update
http://searchwinit.techtarget.com/originalContent/0,289142,sid1_gci1169976,00.html
Microsoft says new cumulative update for Internet Explorer 6 is not security-related.

0 Comments:

Post a Comment

<< Home