Mozilla Corp.'s research arm wants to speed up tasks in Firefox that typically start with a blank tab, like searching, …
Dell launches its first rugged touch-screen laptop
Dell is expected to launch the tough Latitude E6400 XFR laptop with a touch screen, which the company claims can …
Virtualisation: What are the key steps?”
For those of us who grew up praying in the temple of the mainframe, the concept of virtualization is nothing …
Security Implications of the Humble Computer Clock
Is the clock on every computer system in your organization set to the correct time? If your answer is no, …
Nvidia mulls x86 chip for low-cost computers
Nvidia may develop an integrated x86-based chip for use in low-cost computers, an Nvidia executive said this week, a move …
Intel introduces Atom chips for new devices
Intel detailed plans to push its Atom processors into devices beyond just netbooks and mobile Internet devices. The company introduced …
IBM looks to secure Internet banking with USB stick
IBM's Zurich research laboratory has developed a USB stick that the company says can ensure safe banking transactions even if …
WLAN product blitz shows 802.11n getting more affordable
A slew of new WLAN hardware and software suggests that 802.11n high-throughput WLANs are fast becoming more affordable and manageable …
AMD closes deal to spin-off fabs
Advanced Micro Devices Inc. closed a deal with two Abu Dhabi investment firms that spins off its manufacturing operations into …
Most Oracle database shops don’t mandate security patch use
In a pair of online surveys that were jointly conducted between May and August of last year by the International …
New smartphone controls may appeal to IT managers
Research in Motion Ltd. is hoping that the latest version of its BlackBerry Enterprise Server will help convince skeptical IT …
RIM: Battery not source of BlackBerry Bold overheating
Multiple press reports earlier on Friday reported that the overheating of the BlackBerry Bold was related to battery problems. However, …
SonicWALL adds Clean SSL VPN to UTM firewalls
SSL based Clean VPN integration delivers simplified and encrypted connectivity to remote network users while revolutionising protection by inspecting these …
Stimulus could revitalize muni Wi-Fi
Could $7.2 billion in federal funds committed to boost broadband in the U.S. transform small towns like Truckee, Calif., into …
More specialty Linuxes to the rescue
The day of the mold-your-own OS has come, and Linux is the clay. Linux provides free and open access to …
What does a real green data center look like?
Companies looking for a green data center model should take a look at the new facility Internap built in Somerville, …
Project management for networking geeks
Network professionals are typically well versed in the technical aspects of networking: router and switch configuration, server deployment and management, …
9 Dirty Tricks: Social Engineers’ Favorite Pick-Up Lines
What the average guy might call a con is known in the security world as social engineering. Social engineering is …
Conficker worm gets an evil twin
The new variant, dubbed Conficker B++, was spotted three days ago by SRI International researchers, who published details of the …
Develop a game plan for storage security
How much progress is really being made in securing storage? For several years now, pundits have sounded the alarm about …