Enterprise software
Enterprise software covers a wide range of vital IT management decisions, from operating systems to databases, from business applications to integration and middleware. Your software purchasing and development strategy is central to delivering successful IT systems, and we examine the products and trends that help IT managers make the right choices for their organisation.
-
Feature
04 Nov 2024
Coffee badging explained: Why businesses are cracking down
Companies are enforcing return-to-office mandates, and employees aren't thrilled. Boosting morale with perks and flexibility can ease the transition. Continue Reading
-
News
04 Nov 2024
Government’s £600,000 offer to Horizon scandal victims was 'political'
The Post Office was blindsided by the previous government’s decision to offer £600,000 to all subpostmasters wrongly convicted of financial crimes as a result of Horizon failures Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
12 Aug 2007
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
News
10 Aug 2007
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200. Continue Reading
-
News
09 Aug 2007
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide. Continue Reading
-
News
09 Aug 2007
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional storage space. However, NAS appliances do pose some disadvantages. Consequently, the choice of NAS appliance requires careful evaluation. Now that you've reviewed the essential issues involved in any NAS product, this guide focuses on specific considerations for dedicated NAS appliances. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors. Continue Reading
-
News
09 Aug 2007
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
09 Aug 2007
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
09 Aug 2007
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files. Continue Reading
By -
News
08 Aug 2007
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without having to proliferate additional appliances across the network. The product snapshots in this chapter highlight key specifications for a cross section of major NAS appliance products. Continue Reading
-
News
08 Aug 2007
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
By- SearchSecurity.com Staff
-
News
08 Aug 2007
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
08 Aug 2007
Mozilla to extend security in major Firefox update
The next version of Firefox will include new anti-phishing and anti-malware capabilities. Mozilla also plans to release a pair of fuzzing tools to detect Java, FTP and HTTP flaws. Continue Reading
-
News
07 Aug 2007
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is poised to build on this notion with application-aware storage, using business policies to bring autonomy and intelligence to enterprise storage. Still, there is a great deal of confusion surrounding this technology, its capabilities and its deployment. Continue Reading
-
Feature
07 Aug 2007
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
News
07 Aug 2007
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line. Continue Reading
-
Feature
06 Aug 2007
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
News
06 Aug 2007
Researchers wrangle petabytes of data storage with NAS, tape
Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
03 Aug 2007
Discovery of malware cesspool triggers attack fears
Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack. Continue Reading
By- SearchSecurity.com Staff
-
News
02 Aug 2007
Apple releases fixes for Mac OS X, iPhone vulnerabilities
Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone. Continue Reading
By- Edmund X. DeJesus, Contributor
-
News
02 Aug 2007
VMware helps SRM make a comeback
Symantec's CommandCentral version 5.0 adds support for VMware, which experts say will breathe new life into a fading corner of the storage market. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Aug 2007
Black Hat 2007: Vista users urged to beware of IPv6
A researcher warns that attackers could make trouble for Vista users by exploiting Teredo, an IPv6 tunneling tool enabled by default in the latest Windows OS. Continue Reading
By -
News
01 Aug 2007
Users make iSCSI Sans with USB keys
Users say that Open-E's iSCSI San software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Aug 2007
Mozilla fixes two critical Firefox flaws
Firefox version 2.0.0.6 addresses critical flaws involving unescaped URLs passing to external programs and privilege escalation. Continue Reading
By- SearchSecurity.com Staff
-
News
31 Jul 2007
Security update fixes Yahoo Widgets flaw
Attackers could exploit a Yahoo Widgets flaw to run malicious code on compromised Windows computers, but a security update is available. Continue Reading
By -
News
31 Jul 2007
Fixed-content data archiving products get a boost
Caringo, EMC and HDS spruce up their fixed-content data archiving products as buzz around compliance and legal discovery continues. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
31 Jul 2007
Riverbed extends WAFS to laptops
Steelhead Mobile installs on workstations without an onsite appliance. Users say they'd like to see better integration between the mobile and data center versions of the product. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
30 Jul 2007
Warning issued over unpatched Firefox flaw
Vulnerability clearinghouse Secunia and US-CERT have issued advisories about the input validation flaw Continue Reading
By- Robert Westervelt, TechTarget
-
News
30 Jul 2007
Most antispam technologies get failing grade
An independent study finds that many enterprises are not satisfied with traditional antispam technologies. Continue Reading
By- Robert Westervelt, TechTarget
-
News
25 Jul 2007
EMC reports Clariion surge, data archiving slump
EMC's revenues are up this quarter, attributed in part to a big boost in Clariion sales, but CEO Joe Tucci is critical of the company's execution in data archiving. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Jul 2007
Serious flaw affects BIND Internet server software
BIND DNS software, used in translating domain names into IP addresses for Internet traffic, has a flaw that could trick users into visiting a malicious Web site. Continue Reading
-
News
25 Jul 2007
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading
By- Robert Westervelt, TechTarget
-
News
24 Jul 2007
Hifn buys Siafu for storage security, data reduction
Chipmaker Hifn is looking to get into storage systems. It says OEMs are already lined up for encrypted iSCSI SAN and primary storage data reduction products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
24 Jul 2007
XenSource embeds Symantec storage software
Server virtualisation firm XenSource embeds Symantec's storage management software into its hypervisor Continue Reading
By- Jo Maitland, TechTarget
-
News
24 Jul 2007
Apple iPhone crack discovered by security researchers
Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site. Continue Reading
-
News
24 Jul 2007
New hacking technique exploits common programming error
Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error. Continue Reading
-
News
23 Jul 2007
PCI compliance costs often underestimated, study finds
Companies are moving forward with PCI DSS projects, but many are underestimating the costs associated with compliance. Continue Reading
By- Robert Westervelt, TechTarget
-
News
23 Jul 2007
LeftHand refreshes iSCSI SAN software
Version 7.0 of LeftHand's iSCSI SAN software contains dozens of new features, including support for four-way replication and brushed-up thin provisioning. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Jul 2007
Core Security CEO to step down
Paul Paget, the CEO of penetration testing software vendor Core Security Technologies said he is better-suited for start-ups Continue Reading
-
News
22 Jul 2007
Black Hat Las Vegas 2007: Special news coverage
SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas. Continue Reading
-
News
18 Jul 2007
For Boeing, data security, network access still hazy
Boeing is trying to reshape its network security architecture to better protect sensitive systems from threats without degrading employee productivity. Continue Reading
By- Robert Westervelt, TechTarget
-
News
17 Jul 2007
CDP platform purchase considerations
Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write operation. Several CDP appliances are available, but many are implemented in software, and all require careful consideration before purchase. This article focuses on the specific purchase considerations for CDP products. Continue Reading
-
News
17 Jul 2007
Oracle plans 46 security updates for database, software
Attackers could tamper with database servers and host operating systems by exploiting flaws across Oracle's product line. Continue Reading
By -
News
16 Jul 2007
Oracle's July 2007 CPU has 45 security fixes
Oracle stuffed 45 security updates into its July 2007 CPU, fixing flaws across its product line attackers could exploit remotely to compromise corporate databases. Continue Reading
By -
Feature
16 Jul 2007
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, now on the advisory board of Neupart A/S, explains how ISO 27001 can be used to help companies comply with a variety of regulations and standards Continue Reading
By -
News
13 Jul 2007
Antispyware legislation gets tepid reviews
Congress is debating three different bills that would punish spyware pushers, but some IT professionals have their doubts about legislation as a solution to the problem. Continue Reading
By -
News
12 Jul 2007
Mobility could hold the key to broader UC adoption
Unified communications (UC) has been available for several years in various shapes and forms, but adoption within corporations has been slow. Mobile UC is right around the corner and may act as a catalyst for greater UC adoption. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
12 Jul 2007
IBM washes hands of IceCube storage project
IBM is spinning out its long overdue next-generation storage system, code-named IceCube, and is seeking $15 million in funding to commercialize the product. Continue Reading
By- Jo Maitland, TechTarget
-
News
12 Jul 2007
Zero-day auction site highlights ethical debate
A new auction site plans to cash in on flaw research. Executive Editor Dennis Fisher explores if it's a viable business model and if research should be sold to the highest bidder. Continue Reading
-
News
11 Jul 2007
Mobility could hold the key to broader UC adoption
Unified communications (UC) and unified messaging are on the verge of launching a mobile platform. Learn more about mobile UC from Yankee Group's Zeus Kerravala. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
11 Jul 2007
Video over IP: What the voice manager needs to know
Video over IP lets users stream video and videoconference, but when implementing it, voice managers must consider VoIP integration and traffic concerns. Continue Reading
By- Tom Lancaster
-
Feature
10 Jul 2007
Inside MSRC: Microsoft Server flaw should be given high priority
An Active Directory flaw in Windows 2000 server and Windows Server 2003 should be given high priority, according to Christopher Budd of the Microsoft Security Response Center (MSRC). Continue Reading
-
News
09 Jul 2007
Microsoft July updates for critical Excel, Windows and .NET flaws
Of the six security updates Microsoft released Tuesday, experts expressed the most concern about a critical glitch in the .NET Framework that could leave client machines and Web servers open to attack. Continue Reading
By -
News
09 Jul 2007
Google buy shakes up email archiving
Google's acquisition of Postini will boost adoption of Gmail, pushing email archiving players to add support for hosted applications. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
06 Jul 2007
Microsoft preps six security updates for Windows, Office
Microsoft will release six security updates on Tuesday 10 July to address flaws attackers could exploit to launch malicious code and access sensitive information on victims' machines. Continue Reading
By- SearchSecurity.com Staff
-
News
05 Jul 2007
Zero-day auction site opened by Swiss lab
Swiss start-up WabiSabiLabi is offering zero-day findings for qualified buyers. The site could fuel new debate over flaw disclosure. Continue Reading
By -
News
04 Jul 2007
SOA, Web services security gaining priority at large enterprises
All enterprises will have to find tools to secure Web services as Web-based languages, such as extensible markup language (XML) will be gradually introduced into system architectures. Continue Reading
By- Robert Westervelt, TechTarget
-
News
04 Jul 2007
Cisco users upbeat about security direction
Cisco customers say the vendor's security strategy is headed in the right direction, which is why they believe the networking giant's IronPort integration will be smooth sailing. Continue Reading
By -
Feature
03 Jul 2007
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
News
03 Jul 2007
Data storage startups emerge from stealth
Three new storage firms have come out of stealth mode this June. Analysts predict the next new crop of startups will focus on wireless storage, reporting and alternatives to RAID. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
02 Jul 2007
Are PCI auditors pitching products?
Auditors shouldn't be pitching remediation services or products to bring a company into compliance with PCI DSS rules, but some merchants are reporting the practice Continue Reading
By- Robert Westervelt, TechTarget
- News 01 Jul 2007
-
Feature
29 Jun 2007
State agency tiers records storage with Compellent
The South Carolina attorney general's office estimates it will save thousands by storing millions of paper records in digital format using Compellent's automated tiered storage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
27 Jun 2007
Cisco vows to maintain IronPort tech, talent
As it completes the purchase of IronPort Systems, Cisco vows to maintain IronPort's talent base and make investments to keep its newly-acquired technology fresh. Continue Reading
By -
News
25 Jun 2007
Richard Granger's departure may jeopardise NHS IT programme
Richard Granger's departure from Connecting for Health may jeopardise the stability and success of the politically driven NHS National Programme for IT. Continue Reading
By -
Feature
25 Jun 2007
IBM chief engineer talks green storage
IBM engineer Clod Barrera discusses the growing energy crisis in storage, the need for better power efficiency metrics and the future for "green" products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Jun 2007
PCI Council hears complaints, suggestions for changes
Companies with the most stringent security technologies endure hurdles to comply with PCI DSS. Some firms are turning to the upcoming Burton Group Catalyst Conference for answers. Continue Reading
By- Robert Westervelt, TechTarget
-
News
25 Jun 2007
Instant messaging usage increase highlights need for policies
A Burton Group report suggests that all companies should have an IM usage policy, even if they haven't deployed IM yet Continue Reading
By- Kate Dostart, Associate Editor
-
News
25 Jun 2007
Green storage gains ground
HP is just latest vendor to throw its hat into the green storage ring following Pillar Data, HDS and EqualLogic. Continue Reading
-
Feature
21 Jun 2007
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
News
21 Jun 2007
HP users mull blade storage
HP's "blade everything" strategy is starting to emerge in storage. Users at the HP Technology Forum this week mulled the possibilities for the technology. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Jun 2007
10 Ways to Determine if Video Conferencing Can Up Your Productivity and Reduce Your Costs
Video conferencing technologies are the most in-demand applications of the information age. Learn how it can help you boost productivity and reduce costs. Continue Reading
By- Larry Karagheusian, Executive Vice President, GBH Communications
-
News
20 Jun 2007
HP to acquire SPI Dynamics for Web security
HP says it will would bolster Web site assessments and Web application vulnerabilities with its acquisition of Atlanta-based SPI Dynamics Inc. Continue Reading
By- SearchSecurity.com Staff
-
Feature
20 Jun 2007
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
News
19 Jun 2007
Endpoint fears drive PatchLink-SecureWave merger
Experts say the PatchLink-SecureWave merger makes sense since IT pros want a better way to protect their endpoint devices. But PatchLink's market supremacy is far from assured. Continue Reading
By -
Feature
19 Jun 2007
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
By -
News
18 Jun 2007
Will HP do the right thing with SPI Dynamics?
Analysts say HP can dramatically boost its security with the purchase of SPI Dynamics, but some users worry about SPI's technology wilting under the new ownership. Continue Reading
By -
News
17 Jun 2007
Burton Group Catalyst Conference San Francisco 2007
SearchSecurity.com brings you the latest news, interviews, podcasts and more from the Burton Group Catalyst Conference 2007 in San Francisco. Continue Reading
-
News
17 Jun 2007
VoIP security testing fundamentals
Testing your VoIP security system against all the threats that exist on the network can be a full time job. This guide documents how a VoIP system can be tested and suggest some of the available tools to use -- with a focus on fuzzing tools and methods. Continue Reading
-
Feature
15 Jun 2007
Is a merger or acquisition in Sourcefire's future?
Sourcefire founder and Chief Technology Officer Martin Roesch, talks about how Sourcefire fits into Security 3.0 theme and how the firm may be involved in a future merger or acquisition. Continue Reading
By -
Feature
14 Jun 2007
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
By -
Feature
13 Jun 2007
Web applications tangle security researchers, attract attackers
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Continue Reading
-
News
13 Jun 2007
Microsoft patches Windows Vista, IE 7
Microsoft fixed 15 flaws in a variety of products Tuesday, including Windows XP, Vista and Internet Explorer 7. Attackers could exploit the most serious flaws for remote code execution. Continue Reading
By -
Feature
12 Jun 2007
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
News
10 Jun 2007
Connecting for Health briefing claims much of NHS NPfIT complete
A confidential Connecting for Health briefing paper for the prime minister has claimed that much of the NHS's £12.4bn National Programme for IT (NPfIT) is complete - although an integrated national care record system has yet to materialise, and software delivered under the scheme has been criticised by some trusts as not yet fit for purpose. Continue Reading
By -
Feature
08 Jun 2007
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
Feature
08 Jun 2007
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP deployment can be overwhelming and it may seem like you need a technical degree to understand it. Here are five tips to help steer through the fog of a VoIP migration. Continue Reading
By- Zeus Kerravala, Senior Vice President, Yankee Group
-
News
08 Jun 2007
Microsoft to patch Windows Vista, IE 7, Office
In a redesigned advance bulletin for Patch Tuesday, Microsoft said it will fix flaws in Windows Vista, IE 7, Office and other programs. Four updates will address critical problems. Continue Reading
By -
News
08 Jun 2007
Serious flaws put Yahoo Messenger users in peril
Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, vulnerability trackers warned Wednesday. Continue Reading
By- SearchSecurity.com Staff
-
News
08 Jun 2007
VoIP market evolves in 2007
VoIP will see market changes this year as IP PBX sales increase and market leaders shift their focus. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
07 Jun 2007
VoIP performance testing fundamentals
VoIP network performance testing can mean the difference between a VoIP system working at a high level QoS and a weak system that runs so poorly customers could take their business elsewhere. This guide discusses why it is important to run regular performance testing and some of the ways it can be done. Continue Reading
-
News
06 Jun 2007
Zero-day flaws affect Firefox, IE
A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies. Continue Reading
By -
News
05 Jun 2007
IBM to acquire Watchfire for risk, compliance
IBM agreed to acquire Waltham, Mass.-based Watchfire Corp. to add Web application and compliance testing tools into Big Blue's Rational development platform. Continue Reading
By- SearchSecurity.com Staff
-
News
05 Jun 2007
Watchfire will help IBM build application security
Analysts have been pushing the Security 3.0 concept this week at Gartner's IT Security Summit, and one analyst says IBM's acquisition of Watchfire illustrates the trend. Continue Reading
By -
News
03 Jun 2007
IBM: We're No. 1 in storage hardware
A new combined disk and tape tracker from IDC has IBM trumpeting from the rooftops that it's the market leader. But what's IBM's story when it comes to software? Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
03 Jun 2007
Speech technology needs to be more natural to be useful
Once speech technology irons out a few issues, it will become an integral component of many applications and will significantly alter how we access information. In this tip, learn how you can benefit from getting in on this up-and-coming technology. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
01 Jun 2007
Top spammer indicted on email fraud, identity theft
The arrest may reduce the volume of spam in the short-term, say experts and analysts, but the real spam threat comes from criminal gangs based in Asia and Russia. Continue Reading
By- Robert Westervelt, TechTarget
-
News
01 Jun 2007
Sclavos's VeriSign departure leaves many questions unanswered
Some industry observers say disagreements fueled his resignation, but others say Sclavos's abrupt departure revolved around his role in VeriSign's options accounting practices. Continue Reading
By- Marcia Savage, Information Security magazine
-
News
01 Jun 2007
Check Point promises more VoIP security, fewer slowdowns
Check Point's enhanced Open Performance Architecture is designed for deeper security of technologies like VoIP without the network performance problems that often come with it. Continue Reading
By -
News
01 Jun 2007
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Continue Reading
By- Neil Roiter, TechTarget
-
News
01 Jun 2007
Google dives into security market
Search engine giant Google has acquired security startup GreenBorder Technologies, making it a bigger player in the wider information security market. Continue Reading
By -
News
31 May 2007
HDS CEO quits for HP storage biz
Dave Roberson, CEO of Hitachi Data Systems since 2006, has jumped ship to HP to run the server giant's storage business. Continue Reading
By- Jo Maitland, TechTarget