Actuate integrates BI and SaaS platforms with Amazon’s cloud service

Actuate Corporation has integrated ActuateOne – a suite of commercial products for development and deployment of custom business analytics applications – and BIRT onDemand – a SaaS version of ActuateOne – with Amazon Redshift, AWS’s new petabyte-scale cloud warehouse service. When the visualization and analysis features of ActuateOne are combined with Amazon Redshift’s performance, scalability […]

Gain the speed to lead with the VSPEX cloud trailblazer

Cloud computing and virtualization are transforming the way IT is procured, managed and delivered within mid-sized companies. IT executives and administrators are under pressure to respond to new sets of business requirements and expectations faster and more cost-effectively than ever before. Addressing these challenges, the EMC VSPEX Proven Infrastructure – built on EMC’s award-winning VNX […]

Unified communications benefits and risks: does your enterprise really need it?

Building business cases for unified communications (UC) based on cost savings has proven difficult. What’s more, many organizsations are also concerned about data security issues involved.  It is getting clearer that the real benefit of UC comes from better interaction between company employees and from closer integration of communication and collaboration in a more efficient business […]

Cloud attacks are following enterprise workloads

Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report. But while attacks on cloud environments have increased significantly in frequency and are becoming as diverse as those targeting on-premises data centers, the data also reveal […]

Security vendors rush to plug serious Internet vulnerability

A serious Internet vulnerability dubbed “Heartbleed” has exposed 66 percent or more of the Internet to attack, according to Finnish digital forensics and security company Codenomicon, which discovered the security hole. By exposing the memory contents of a Web site’s server, the Heartbleed vulnerability potentially allows attackers to steal the most sensitive information such as […]