It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the …
Sharp turns like Cisco’s have a long history
But even though it's the most hotly anticipated move in a long time for an IT vendor, this isn't the …
Best security questions to ask about SaaS
Security issues have to be clearly examined before diving into software as a service (SaaS), warns Burton Group analyst Eric …
Cell phone, smartphone — what’s the difference?
What is a smartphone? The answer is not so simple, judging by the number of definitions available. In fact, it …
Measuring data center efficiency easier said than done
Containing the cost of powering the data center is one of the chief priorities for many IT and facilities professionals. …
Google knows where you surfed last summer
Google knows who you are. It knows what you search for. It knows what you had for dinner last night …
How Vista mistakes guided changes to Windows development
About a year ago on its Redmond, Washington, campus, a member of Microsoft's Windows Vista team met with a group …
Cloud computing wins converts
Most IT leaders see cloud computing as viable technology that can help the bottom line, but concerns about security and …
Android For Desktops? I Doubt It
For years, my friend Stephen J. Vaughan-Nichols has been trying to turn Linux into something it is not: A successful …
Adobe patches zero-day PDF bug, mum on details
Adobe patched a critical vulnerability in its PDF viewing and editing software that hackers have been exploiting for more than …
Internet Explorer 8: Security Features for Enterprise Users
Over the past year, Internet Explorer has lost market share while browsers such as Mozilla's Firefox, Apple's Safari and even …
Mobile browsers bring new security headaches
The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. …
Security expert worries about smart phone, TinyURL threats
It’s just that F-Secure’s chief security advisor doesn’t want people overlooking the other 29,999 malware files his company sees a …
The promise of desktop virtualisation
What is desktop virtualisation? The use of software to abstract the operating system, applications and associated data from the user's …
Users gain options for mobile voice encryption
U.S. President Barack Obama's dilemma over the security of his BlackBerry has given rise to an increased interested in systems …
Corporate SaaS considerations myriad, complex
Amid the growing popularity of software-as-a-service, IT managers are faced with a sometimes monumental task of developing big-picture strategies and …
Patching it up
By all accounts, patching software is a disruptive, time-consuming process requiring IT departments to test any new software patch before …
Security Implications of the Humble Computer Clock
Is the clock on every computer system in your organization set to the correct time? If your answer is no, …
Vendors see future in iPhone business applications
The iPhone may generally be considered a consumer device, but several vendors at the Cebit trade show this week are …
Alcatel-Lucent launches unified communications support
Alcatel-Lucent announced support today for smartphones and high-definition videoconferencing in its new OmniTouch 8400 Instant Communications Suite of products. The …