ERP: Protecting the pipeline by focusing on business-critical platforms
In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners.
Steve Ragan | 06 Aug | Read more
In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners.
Steve Ragan | 06 Aug | Read more
As software vendors tend to do during their big annual user conferences, SAP made a lot of promises to customers this week at Sapphire. The overarching theme was a desire to make SAP's software simpler and its customers' lives easier.
Chris Kanaracus | 07 Jun | Read more
A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access SAP servers from infected workstations.
Lucian Constantin | 21 Nov | Read more
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
Lucian Constantin | 01 Nov | Read more
SAP is planning to rely heavily on HTML5 and open standards within its products for building mobile applications, and is embracing the concept of BYOT (bring your own tools) in order to draw interest from developers.
Chris Kanaracus | 22 Oct | Read more
A new tool from security vendor Onapsis aims to secure SAP's in-memory database HANA, the German company's fastest-growing data processing product.
Jeremy Kirk | 16 Oct | Read more
SAP may build a second data center in Australia in order to meet customer demand for locally delivered cloud services in the wake of revelations over the U.S. National Security Agency's Prism surveillance program.
Chris Kanaracus | 01 Oct | Read more
UK businesses have conquered their "irrational fears" of Linux and the majority now depend on it for some part of their mainstream business applications, a survey of 200 IT executives has found.
John E Dunn | 16 Aug | Read more
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.
Lucian Constantin | 19 Jun | Read more
Citrix has announced its mobile device management platform, XenMobile, which will offer companies a secure way for employees to access native Citrix apps in the cloud as well as third-party software, such as Windows, SAP or even Salesforce.com.
Lucas Mearian | 20 Feb | Read more
Nissan has selected a cloud-based procurement and financial management tool rather than an SAP on premise solution, in a bid to migrate away from paper to full electronic order to invoice processing.
Derek du Preez | 16 Jan | Read more
The mock attack, called Project Mayhem, accesses system's database to divert funds without detection
Antone Gonsalves | 08 Dec | Read more
Dell is expanding its services based on SAP's HANA in-memory database to help organisations in Europe make informed decisions, improve operations and increase performance.
Sophie Curtis | 13 Nov | Read more
A home improvement retail chain can use an app running on an iPad to help design a customer's home, check inventory for the products, give a cost estimate to the customer, and take orders.
John Ribeiro | 25 Oct | Read more
One of the biggest technology trends this year has been the continuing influx of consumer-oriented into the workplace. From <a href="http://www.computerworld.com/s/article/9220934/Caution_iOS_5_iCloud_and_the_iPhone_4S_in_the_enterprise">iPads and iPhones</a> to Android phones and tablets, 2011 will go down as the year the consumerization of IT reached a critical mass. It's no longer a question of whether IT departments will support and embrace consumer-first devices, <a href="http://www.computerworld.com/s/article/9221289/IBM_opens_up_smartphone_tablet_support_for_its_workers">bring-your-own-device (BYOD) programs</a> and the expanded sphere of mobile platforms -- now, the issue is more about when and how.