Global virtualisation penetration is on pace to reach 20 per cent in 2009 from 12 per cent in 2008. Its …
Symantec to release Endpoint Virtualization Suite this spring
Symantec unveiled Endpoint Virtualization Suite, its set of server-based tools for controlling and delivering laptop and desktop application environments through …
Kaspersky releases AV prototype for Windows 7
The new technical prototype of Kaspersky Anti-Virus is designed to secure computers running under Windows 7. The beta test version …
The promise of information cards
UAE authorities recently announced they had broken up an international Internet data-smuggling ring suspected of hacking into the credit network …
With global effort, a new type of worm is slowed
There have been big computer worm outbreaks before, but nothing quite like Conficker . First spotted in November, the worm …
Loving the cloud
Back in 1991, before the Internet was a big deal, Ohio State University technologist Jerry Martin signalled the nascent Internet's …
Life beyond Google
Although it may sound like heresy, Google isn't the only game in town. Despite Google's large index and generally excellent …
Acer takes on smartphone market
Acer has jumped head first into the smartphone market with its Tempo family of devices. They are all touch-enabled and …
Untangling Windows Upgrades
IT managers are facing a perfect storm of Windows upgrade options. While the Windows 7 beta has garnered some of …
Sun premiering JavaFX Mobile component
Proceeding to a critical phase in the rollout of its JavaFX platform for rich media client applications, Sun will ship …
Lenovo Constant Connect serves as an e-mail go-between
Business travelers will be able to use their BlackBerry smartphones to automatically forward e-mail to their ThinkPad notebook PCs with …
Contracting economy forces new cellular priorities
The only reason an enterprise IT professional would go to this year's Mobile World Congress is to track down a …
Conficker worm draws a counter-attack
In addition to the team's mission to grab domain names Conficker (aka Downadup) might try to use, Microsoft is offering …
Cloud computing obstacles, opportunities
UC Berkeley researchers have outlined their view of cloud computing, which they say has great opportunity to exploit unprecedented IT …
Hacker challenge takes aim at browsers, smartphones
A hacking contest that has grabbed headlines two years running will take aim next month at browsers and smartphones, according …
BlackBerry bug threatens Windows users
Research In Motion Ltd., maker of the popular BlackBerry smartphone, yesterday warned users of a critical bug that can expose …
WAN critical to virtualization’s payoff
Guaranteeing application performance over a WAN is hard enough. Now try doing it in a virtual environment. WAN optimization vendors …
Managing software assets
The current climate of company mergers and downsizing is putting CIOs under pressure to keep the lid on software costs …
The cloud-SOA connection
Cloud computing may have overtaken SOA as the trendy technology term du jour, but the two concepts can be paired …
The incredible shrinking operating system
From the software concept called JeOS (pronounced “juice”), the Just Enough OS, to hardware concepts like Celio RedFly, an 8-inch …