Enterprise software
Enterprise software covers a wide range of vital IT management decisions, from operating systems to databases, from business applications to integration and middleware. Your software purchasing and development strategy is central to delivering successful IT systems, and we examine the products and trends that help IT managers make the right choices for their organisation.
-
Tip
22 Nov 2024
7 requirements for a transportation management system
Essential TMS features are real-time tracking, route optimization, carrier management, load planning, fleet management, automated billing and invoicing, and analytics tools. Continue Reading
By -
News
22 Nov 2024
Swiss encrypted messaging service, ePost, targets one million postal users
Swiss ePost chief Renato Stalder bets on encrypted communications as demand for letter delivery falls Continue Reading
By- Bill Goodwin, Computer Weekly
- Photo Story 10 Nov 2008
-
Photo Story
29 Oct 2008
Photos: Sneak peek at Windows 7
Following the announcement of Windows 7, Computer Weekly takes a look at some of the new features. Continue Reading
By- Faisal Alani, UK at eBay
-
Feature
05 Sep 2008
The CERN laboratory and the Big Bang theory – Essential Guide
We answer 10 frequently asked questions about the CERN laboratory and Big Bang theory Continue Reading
By -
News
21 Aug 2008
Microsoft and Novell expand Windows/Linux integration deal
Microsoft and Novell are extending their interoperability agreement to tie Windows closer to Novell's SUSE Linux in the enterprise. Continue Reading
-
News
15 Aug 2008
What is Unified Communications?
Confused by Unified Communications? This article and accompanying e-book download explains what is UC, what is not UC, and how to put it to work. Continue Reading
By- Blair Pheasant
-
Feature
16 Jul 2008
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
By -
News
27 Jun 2008
Unified Communications opportunity can be lost by bad management
Unified Communications can go awry when users are too connected, too often.Some companies, Intel included, are therefore switching off access to their staff at some times! Continue Reading
By- Michael Morisy, TechTarget
-
News
18 Jun 2008
Unified communications' business value cloudy, but enterprises want it
Unified communications (UC)'s business value remains unclear, but line-of-business executives are all for the technology. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
17 Jun 2008
Integrating presence into the enterprise
Confused by presence and its benefits? Here's how to get the technology working for you. Continue Reading
-
News
06 Jun 2008
Microsoft OCS powerful but needs third parties for complete solution
Microsoft's OCS can run enterprise voice, but users are waiting for links to existing products before taking the plunge, analysts say. Continue Reading
By- Michael Morisy, TechTarget
-
Feature
28 May 2008
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web links. Continue Reading
By -
News
04 Apr 2008
Does rapid UC innovation beget slow implementation rates?
As unified communications (UC) technology grows, many enterprises are left to play catch-up. Continue Reading
By- Jessica L. Dempsey
-
News
24 Mar 2008
Open platforms are essential to the future of unified communications
At VoiceCon 2008, keynote speakers stressed the importance of openness and interoperability of unified communications platforms. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
18 Mar 2008
Avaya solves fragmented presence problem with federated presence server
Avaya launches Intelligent Presence Server, which solves the problem of fragmented presence within an enterprise. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
06 Mar 2008
Siemens OpenScape offers tight integration of voice, video and messaging
Siemens OpenScape Unified Communications Server offers voice, video and messaging integration. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
27 Feb 2008
Alcatel-Lucent Forum: The Dynamic Enterprise
The Alcatel-Lucent Forum recently held in Paris was centred on building the Dynamic Enterprise. Continue Reading
By- Blair Pheasant
-
News
19 Feb 2008
Top ten UC terms
Here you'll find our ten favourite unified communication terms, including communication-enabled business processes, SIP, IM, presence, and more. Continue Reading
By- Leigha Cardwell, TechTarget
-
News
11 Feb 2008
Build a solid Web conferencing strategy
Web conferencing application implementation is expected to grow along with the introduction of video and sharing elements. Continue Reading
By- SearchVoIP ANZ Staff
-
News
06 Feb 2008
IM security threats and resources
Instant messaging applications have their own set of security guidelines to prevent hacking. Continue Reading
By- Jessica L. Dempsey
-
News
04 Feb 2008
The benefits and challenges of presence within unified communications
Unified communications may be the next big thing in networking, but presence is quickly becoming the next big thing within unified communications. Continue Reading
By -
Tip
28 Jan 2008
Mobile video conferencing and interactive multimedia
This chapter excerpt provides an understanding of mobile video conferencing technology, standards and applications. Continue Reading
By- James R. Wilcox and David K. Gibson
-
Tip
16 Jan 2008
What's the value of unified communications?
Implementation of unified communications as a part of your organization's strategy to increase productivity can be made easier by answering a few questions. Continue Reading
By- Gary Audin, Delphi Inc.
-
News
11 Jan 2008
Cisco's new collaboration tools key to green strategy
Cisco's green guru Paul Marcoux explains how TelePresence and unified communications can cut costs while helping the environment. Continue Reading
By- Michael Morisy, TechTarget
-
News
07 Jan 2008
Fire IT project two years late and £70m overbudget
A government IT project aiming to centralise fire control rooms is two years behind schedule and more than 50% overbudget, according to a report from the Communities and Local Government Committee. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
News
20 Dec 2007
Christmas open source guide
2007 say a boatload of open source VoIP offerings. Read all about that, plus more, in our holiday open source hamper. Continue Reading
By- TechTarget ANZ staff
-
News
20 Dec 2007
Wireless Christmas hamper
Wireless is all the rage. But it's not easy to do, or do well. Get some holiday guidance with our collection of guides. Continue Reading
By- TechTarget ANZ staff
-
News
19 Dec 2007
Web conferencing: Adoption grows and evolution continues
As one of the key technologies of unified communications, web conferencing will continue to grow, adding application-sharing and video elements. Continue Reading
By- Peter Brockmann
-
News
07 Dec 2007
EC to use mobile phones to track carbon footprints
New application allows users to see how their daily choices impact climate change in terms of the major greenhouse gases Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
14 Nov 2007
Home Office awards £650m e-Borders contract
The Home Office has awarded its £650m eBorders contract to a consortium led by Raytheon Systems. Continue Reading
-
News
12 Nov 2007
More ICT scholarships inbound
Scholarships for the IT industry totalling a value of $250,000 will be available at the beginning of the coming academic year, it was announced last week. Continue Reading
By- Voice&Data Staff
-
Tip
12 Nov 2007
Why you need VoIP to move to unified communications
Making the move to unified communications is an intricate five-step process that requires a solid foundation. Continue Reading
By- Gary Audin, Delphi Inc.
-
Feature
06 Nov 2007
How to select a storage capacity planning tool
To select a storage management and capacity planning tool, first calculate how much storage is available and how much of your total storage capacity is actually being used. Continue Reading
-
Feature
06 Nov 2007
How data deduplication works
Chapter one of our data deduplication handbook takes you under the hood to show how data deduplication works so you can maximise the efficiency of this data reduction technology. Continue Reading
-
News
06 Nov 2007
CommVault revenues spike after update of Simpana backup app
CommVault attributes a spike in sales to the integration of features such as archiving, replication and search into its backup products. Continue Reading
By -
News
06 Nov 2007
Adaptec reports losses
Adaptec's revenue was down year over year, as well as sequentially; DataDirect says the InfiniBand business is booming. Continue Reading
By- SearchStorage.com Staff
-
News
06 Nov 2007
Users leaving Fibre Channel for iSCSI Sans find pros, cons
Users who recently updated aging Fibre Channel equipment with new iSCSI San products have found ease of use can be a double-edged sword. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
31 Oct 2007
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
31 Oct 2007
Unified communication applications for businesses with remote workers
Bill Trussell decodes the unified communications (UC) ciphers for you and makes a UC recommendation. Continue Reading
-
News
30 Oct 2007
Riverbed posts profit, but stock slips
Riverbed reports higher sales, but its stock fell 25% on a poor rating from financial analysts. Continue Reading
By- SearchStorage.com Staff
-
News
30 Oct 2007
Non-unified communications can cost millions
Fragmented communications are costing companies millions of dollars by disrupting work flow and business processes, a new study has revealed. Continue Reading
By- Andrew R. Hickey
-
News
21 Oct 2007
VoIP certification credentials
Many certifications touch on voice over IP topics tangentially, but numerous credentials now focus a fairly substantial portion of their coverage on this subject matter. In this certification survey, we take a look at available certifications, distinguishing between those credentials for which VoIP is a primary topic and those for which it is secondary. Continue Reading
By -
News
21 Oct 2007
DreamWorks draws on storage for animation
DreamWorks' senior technologist says it takes a lot of emerging storage technologies to make an animation movie. Continue Reading
By -
News
16 Oct 2007
Microsoft OCS won't change UC game ... Yet
Uptake of Microsoft's software-based unified communications solution will be hindered by perceptions of the company as unreliable, analysts say. Continue Reading
By- Andrew R. Hickey
-
News
14 Oct 2007
SNW Preview: Data protection makes a stand
Led by EMC's integration of data deduplication and CDP into its backup software, data protection products are prominent at Storage Networking World. Continue Reading
By- Dave Raffo, News Director; Beth Pariseau, News Writer
-
News
14 Oct 2007
VMware takes on data migration
VMware supports migrating data between disc arrays with Storage VMotion, changing the equation between server and storage virtualisation devices. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
10 Oct 2007
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based encryption is typically handled as a specific event or process (e.g., encrypting data during a backup process), appliance-based encryption normally can handle any quantity of data in flight. Continue Reading
-
News
10 Oct 2007
Unified communications new priority for HP
Unified communications is a confusing area with a number of vendors in the mix. HP has launched new services to help ease companies into unified communications and help them determine which integrated tools will best fit their business goals. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
09 Oct 2007
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Feature
09 Oct 2007
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for SMBs. Continue Reading
-
News
08 Oct 2007
Happy Birthday to TechTarget ANZ
It's our birthday! Join us in wild celebration by remembering our most-read articles of times past. Continue Reading
By- Simon Sharwood
-
News
07 Oct 2007
IP telephony adoption rising, quality sagging
IP telephony adoption continues to grow, but service quality is lagging behind, according to a user survey from Psytechnics. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
07 Oct 2007
IP PBX eases VoIP transition for gas company
An IP PBX with Sip helped one gas company upgrade to a new phone system while also jumping into VoIP. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
05 Oct 2007
Podcast: the true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter and Martin believes newly trained IT professionals are ill-equipped to deal with the sophisticated nature of modern attacks due to limitations in the current way IT security is taught. Continue Reading
By- Cliff Saran, Managing Editor
-
News
04 Oct 2007
Pillar announces support for 1 TB SATA drives
Pillar is one of the earliest to announce 1 TB SATA drives in an enterprise array. IBM's SVC becomes the first storage virtualization product certified with VMware. Continue Reading
By- SearchStorage.com Staff
-
News
02 Oct 2007
Web 2.0 strategies for SMBs
Web 2.0 technologies are catching on at companies of all sizes. Find out how to make them work for your SMB with SearchSMB.com's top five Web 2.0 tips. Continue Reading
-
Feature
01 Oct 2007
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
By -
News
26 Sep 2007
Presence capabilities open university help desk
Presence capabilities have helped one university ensure that calls into its help desk reach the person with the right set of skills. Continue Reading
By- Susan Fogarty, Senior Director
-
News
26 Sep 2007
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review. Continue Reading
-
News
25 Sep 2007
How to purchase a data encryption product
Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products. Continue Reading
-
News
24 Sep 2007
Microsoft's OCS changing the face of VoIP?
Microsoft's OCS platform debuts soon, but will it bring about an industry shift to embedded communication applications as promised? Continue Reading
By- Zeus Kerravala, ZK Research
-
News
24 Sep 2007
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. Continue Reading
-
Feature
23 Sep 2007
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Feature
19 Sep 2007
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading
By- Paul Holliday, global market analyst, Siemens Enterprise Communications
-
News
16 Sep 2007
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments. Continue Reading
By- SearchStorage.com Staff
-
News
16 Sep 2007
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager Express. Continue Reading
By- Danelle Au, Baldwin Choi, Rajesh Haridas, Christina Hattingh, Ravi Koulagi, Mike Tasker, Lillian Xia
-
News
09 Sep 2007
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
07 Sep 2007
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix. Continue Reading
By- SearchSecurity.com Staff
-
News
07 Sep 2007
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned. Continue Reading
By -
News
07 Sep 2007
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Continue Reading
By- Robert Westervelt, TechTarget
-
News
06 Sep 2007
Citrix adds Web security with acquisition
Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing. Continue Reading
By- SearchSecurity.com Staff
-
Feature
06 Sep 2007
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment is a significant step toward interoperability and seamless mobile connectivity between private WLANs and public wireless and cellular networks. Continue Reading
-
News
05 Sep 2007
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out. Continue Reading
By- Neil Roiter, TechTarget
-
News
05 Sep 2007
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes. Continue Reading
By -
News
05 Sep 2007
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system. Continue Reading
By- SearchSecurity.com Staff
-
News
04 Sep 2007
IT cheat sheets for all
They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz. Continue Reading
-
News
30 Aug 2007
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia. Continue Reading
By- SearchSecurity.com Staff
-
News
30 Aug 2007
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system. Continue Reading
By- SearchSecurity.com Staff
-
News
29 Aug 2007
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology. Continue Reading
By -
Feature
29 Aug 2007
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
28 Aug 2007
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be accessed quickly when needed. There is simply no time to search through burgeoning volumes of tape or optical media to locate important files. Traditional backup platforms are poorly suited for archival data storage, and users are relying on disk storage systems for a mix of performance and reliability. Files can be archived to any disk storage system, but content-addressed storage (CAS) technology has appeared to support archiving efforts. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
28 Aug 2007
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. Continue Reading
By -
News
27 Aug 2007
VoiceCon Fall 2007: Unified communications still has barriers
Unified communications (UC) offers streamlined communication, but significant challenges still need to be addressed. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
26 Aug 2007
IBM back in iSCSI SAN fray
IBM is looking to take on HP's MSA and EMC's AX150, as well as EqualLogic and LeftHand, with a new iSCSI SAN product OEMed from LSI. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
23 Aug 2007
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
By -
News
22 Aug 2007
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. Continue Reading
By -
News
22 Aug 2007
Microsoft adds CA vets to anti-malware team
Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab. Continue Reading
-
News
22 Aug 2007
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042. Continue Reading
By -
Feature
21 Aug 2007
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Aug 2007
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Continue Reading
By -
News
20 Aug 2007
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology. Continue Reading
-
News
19 Aug 2007
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications. Continue Reading
By -
News
19 Aug 2007
Push voice is the next mobility must-have
Push voice, coupled with mobile email, has the potential to make the smartphone a true mobile office. Continue Reading
By- Andrew R. Hickey
-
News
17 Aug 2007
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network. Continue Reading
-
News
17 Aug 2007
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Aug 2007
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
By- SearchSecurity.com Staff
-
Feature
16 Aug 2007
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
News
15 Aug 2007
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS. Continue Reading
By -
News
14 Aug 2007
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite. Continue Reading
By- Robert Westervelt, TechTarget
-
News
14 Aug 2007
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone. Continue Reading
By -
News
13 Aug 2007
Data backup copies overview
How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor