Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on …
What it will take for mobile VoIP to get enterprise-ready
By all rights, mobile VoIP sounds like an enticing proposition for a lot of companies. After all, what enterprise wouldn't …
What Cisco’s UCS means to management vendors?
Cisco's Unified Computing System (UCS) launch earlier this week impacted several vendors across the management software market. Not only did …
Symantec launches cloud-based storage service for the masses
Symantec Corp. formally unveiled its cloud-based storage service, Norton Online Backup, marketing it as a consumer product for managing up …
Could IBM be Sun’s savior?
The high-tech rumor mill churned at high speed Wednesday as industry watchers debated the good, the bad and the ugly …
Future Ethernet – Fiber vs. Copper
Ethernet started as the shared copper medium (cable) technology. As data speed increased from 10Mbps to 1Gbps, then Ethernet no …
EMC unveils new features for home, small-business NAS drive
EMC Corp.'s Iomega Corp. division Tuesday unveiled new features for the Iomega StorCenter ix2 network-attached storage (NAS) drive, including Web …
Facebook puts privacy controls in hands of its users
Facebook is giving its users greater control so they can specify just how private they want their profiles, updates, photos …
New iPhone capabilities appeal to enterprises
The new iPhone 3.0 software previewed on Tuesday has some features that should make enterprise users happy, but it lacks …
The stateful LAN: Layer 7 visibility and control
Enterprises have seen an explosion of new applications, devices and classes of users on their LANs, which makes it harder …
Copper at the crossroads
Most companies like to think of their cabling systems as plumbing, a fixed quantity that is altered only at substantial …
I(TS)2 designated as a qualified security assessor for PCI audits certification
IT Security Training & Solutions – I(TS)2, the Middle East’s premier provider of integrated Security Education & Certification Curriculum, Security …
Knowing optical networking
Remember those World War II Navy movies where a sailor on one ship signaled to another by flashing Morse code …
Wireless remote wand coming to next-gen Apple TV?
Apple is exploring ways to include a wireless “remote wand” for its next-generation Apple TV that would add the same …
Three reasons Microsoft shouldn’t port Windows to the ARM processor
Microsoft Corp. is facing increasing pressure to bring its mainstream Windows operating system to the ARM mobile CPU. But analysts …
Amazon, Microsoft improve their cloud computing game
Amazon has introduced EC2 Reserved Instances, which allow you to obtain a reduced hourly fee for an upfront payment that …
Establishing End to End Trust
It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the …
Copper tops 10 Gigabits
When the first 10 gigabit Ethernet standard was released, sky-high prices of more than $50,000 per port kept many IT …
Best security questions to ask about SaaS
Security issues have to be clearly examined before diving into software as a service (SaaS), warns Burton Group analyst Eric …
Cell phone, smartphone — what’s the difference?
What is a smartphone? The answer is not so simple, judging by the number of definitions available. In fact, it …