With IT usage growing maturing it is time for SIs to re-think their offerings and scale up the value chain. …
WD takes digital media collections to big screen
Western Digital introduces a simple way for consumers to play their stored digital content on their HDTV in Full-HD 1080p …
NEC develops three-format RFID reader
Engineers at NEC have developed a RFID (radio frequency identification) card reader compatible with all three major wireless formats. The …
Mindware gets recognition
Mindware has been awarded the ‘Best Distributor – Branded Growth’ by Kingston Technology, the world's largest independent manufacturer of memory …
Threats to online users growing: IronPort
IronPort Systems, provider of solutions that protect businesses against spam, viruses and malware, and now part of Cisco, is going …
Interactive Data enables Mubasher with real-time content
Interactive Data Corporation a leading provider of financial market data, analytics and related services, announced that its Real-Time Services business …
Cisco delivers the Carrier Ethernet foundation for the ‘Zettabyte era:’
Cisco today announced a major leap in networking technology at the service provider network edge with the introduction of the …
Avaya adds words to the voicemail
Avaya will let enterprise workers leave voicemail messages and combine them with e-mail, giving both callers and recipients new options …
Nvidia targets professional users
Nvidia's Quadro FX 5800 packs 4G bytes and 240 graphics processor cores, but the US$3,500 graphics board isn't designed for …
Process-driven architectures
Enterprises are tailoring their architectures to the key business processes that they must support and comply with. Take a look …
Meru brings Virtual WLANs
Meru Networks has brought the techniques of virtualization to its enterprise wireless LAN products, allowing an optimization of radio frequency …
EMC’s new cloud offering
EMC unveils its long-awaited cloud storage offering, a combination of hardware and software that promises to help businesses build and …
Critical infrastructure often under cyberattack: Study
Computer systems that run the world's critical infrastructure are not as secure as they should be and insiders are mad. …
Critical infrastructure often under cyberattack: Study
Computer systems that run the world's critical infrastructure are not as secure as they should be and insiders are mad. …