Salesforce.com's Dreamforce conference emphasized a mobile-first business strategy and user-friendly applications.
From the Salesforce Analytics Cloud to the Sales and Service Clouds, Dreamforce 2014 attendees want ROI from their investment in Salesforce's platform.
Beacon technology aims to change the way retailers interact with customers. But new location-based technologies usher in not only convenience but also privacy concerns.
IBM Kenexa Talent Insights with HR analytics from Watson cognitive computing leads a roundup of innovative software demonstrated at the 2014 HR Technology Conference & Exposition.
Before switching from Excel spreadsheets to financial management software, companies need a plan that aligns with their finance processes -- and one that will scale as the business evolves.
Keynoter Didier Bonnet of Capgemini Consulting shares findings from his new book on digital transformation in a video interview from Oracle OpenWorld 2014.
Despite IT pros' mixed feelings on Docker, there are some advantages to running the containers on AWS EC2 instances. We cut through the hype.
2nd Watch manages enterprise workloads in AWS. Learn about trends and wish list items in this Q&A with the firm's new CEO.
Even a startup born in the cloud can quickly outgrow its surroundings. Recognizing the growing pains has its benefits, as one AWS user experienced.
Democratized BI tools within ERP application suites promise to finally make ERP analytics a reality.
Don't overdo KPIs -- a handful should be enough to capture the essence. Any more than that dilutes the user's attention, drawing focus away from key measurements.
Some manufacturers are expanding lean and sustainability strategies to the supply chain to reduce waste and bolster efficiencies, but extending these practices outside a company's four walls won't be easy.
Casino operations traditionally haven't been very data-driven, but the Sands casino group is using analytics tools to try to get an edge in a very competitive industry.
Consultant Rick van der Lans says most self-service business intelligence tools fall short at the operational level, leaving some key business users locked out of the self-service BI process.
Many companies don't apply data analytics tools to IT security processes. But commentators at a SAS conference said doing so could help them identify and stop security threats.
Though complex, penetration testing is worth the effort and helps make Web applications as secure as possible. Here are some tips for testing effectively.
See what distinguishes Alpha Anywhere, a platform that allows developers to quickly create prototypes of potential new applications.
Our business is relying more and more on smart process applications to manage business-critical processes. This means application security is even more important than ever. What's your advice on ensuring not only that the code is secure, but that business logic is also secure? I want to ensure that the functionality as designed isn't exploitable.
We're moving into an age of increased application componentization and distribution of components, even in the cloud. Developers should look beyond JMS for Java messaging.
Are you a JMS and JMS API know-it-all? Prove it with our quiz.
Obtaining an IT assessment from an outside source may find problems and benefits a company may not realize on its own.