Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

We're continually surprised at how low online scammers will go to make a quick buck. We suppose we shouldn't be; after all, these folks are some of the scum of the earth, and if you need any more proof of that, just take a look at how they're exploiting the devastating earthquake in Japan... Read more...
Solid state drives have a number of advantages over traditional hard drives. They're faster, less noisy and more reliable in general. But now, Samsung's line of SSDs have another huge benefit: self-encryption. Samsung has announced this week that they have the only SSD to feature... Read more...
The education market is changing rapidly, and in major ways. Just ten years ago, there was just one way to get a degree, and that was to show up at campus each day throughout the year and work away class after class. Today, you've got a variety of options, and the amount of alternatives are... Read more...
Another day, another survey that's not surprising at all to anyone in the technology field. Try as they may, most administrators and IT workers can't go 24 hours without being hit with at least one complaint that isn't link to malware, or other software that should not have been on a worker's... Read more...
Super Talent introduced a new USB 3.0 SuperCrypt drive that offers AES hardware encryption and high performance. The new drive is available in capacities of 16GB, 32GB, 64GB, 128GB and 256GB and supports USB 3.0 speeds of up to 240MB/s. For encryption, Super Talent offers two options, both of... Read more...
Network-attached storage (NAS) devices come in all shapes and sizes; some even come without hard drives--with the intention that the users will add the drives themselves. There is even a relatively new category of NAS devices that don't have any internal drives at all, and instead use... Read more...
Although still in its infancy, data loss prevention software is becoming increasingly important for companies who wish to protect the accidental and intentional release of sensitive information. To assist, Sophos introduced free programs... Read more...
With the growing popularity of cloud-based storage solutions, such as the Amazon S3 and Nirvanix services, many businesses--both large and small--are eschewing traditional onsite file servers, and instead opting for offsite, third-party storage solutions. But the ongoing cost of maintaining... Read more...
With the growing popularity of cloud-based storage solutions, such as the Amazon S3 and Nirvanix services, many businesses--both large and small--are eschewing traditional onsite file servers, and instead opting for offsite, third-party storage solutions. But the ongoing cost of maintaining cloud-based storage as well as the often unproven... Read more...
Remember all that hoopla surrounding President Obama's use of a standard BlackBerry? Surely you recall just how crazy our government is when it comes to security, so we're not shocked in the least to hear that SanDisk is caving to those strict requests in order to get its Cruzer flash drive... Read more...
Regardless of their size or industry, most businesses depend on ready and secure access to their data. To a business, "secure" means that its data is protected from hardware or software failures and is safe from prying eyes. But small and even some medium-sized businesses often can't afford to maintain a data center, let alone a dedicated... Read more...
The rise of social networking has given rise to a whole new species of cyber criminals, experts warn.When people sign up on Facebook, for example, they tend not to think twice about putting in their birth date. But combine that with all sorts of other personal data in your profile — contact... Read more...
We knew that spam e-mails drained our time, resources, and productivity, but apparently spam is also contributing to global warming. Security-technology company, McAfee, and the technology-research company, ICF International, have just released a joint study that claims that the 62 trillion... Read more...
No less than three different browser platforms have succumbed to zero-day exploits by the end of the first day of the three-day long, third-annual Pwn2Own contest being held at the CanSecWest 2009 digital security conference in Vancouver, British Columbia. Safari on Mac OS X was the first to... Read more...
Sony Corporation today announced the development of a finger vein authentication technology called "mofiria." The user-friendly technology offers quick response and high accuracy and comes in a compact size for mounting on mobile devices such as a personal computer or mobile phone.With the... Read more...
You may have heard of Schlage. It's a well-known company in the lock industry, and you've likely seen at least one Schlage lock in a door somewhere. Well, they've just launched Schlage LiNK, a suite of products that encompasses not just security, as in an alarm system, but a control system for your locks and a monitoring system for the house.... Read more...
Digital photo frames are a hot gift item these days, but anyone buying a Samsung SPF-85H 8-inch digital photo frame through Amazon.com this year may have given their loved ones a little something extra: A computer virus.Amazon reached out to its purchasers with a note just before the holiday.Here's a snippet of their warning to customers:... Read more...
Traditional antivirus (AV) testing, such as that done by organizations such as AV-test.org and AV-comparatives.org, uses collections of malware to demonstrate the capabilities of security products. Secunia, on the other hand, focuses on exploits. For example, it has a scanner at its site that will search your system for unpatched vulnerabilities... Read more...
It used to be fairly straightforward choosing a browser. Internet Explorer came bundled with everything, a few hardy souls got on the Firefox bandwagon early, Apple freaks used Safari, and Ron Paul voters used Opera. Since hackers concentrated their attention on the target-rich environment of... Read more...
As gamers and hardware enthusiasts, it’s easy to get jaded by Extreme Edition processors and multi-card CrossFire configurations. They push performance full-bore. And although you’ll never hear AMD, Intel, or NVIDIA recommending against using their enthusiast offerings in higher-end configurations, there’s no denying that Xeons, Opterons,... Read more...
Could anything else possibly fit the word "ironic" better than this?Part of security software vendor CA's Web site was hacked earlier this week and was redirecting visitors to a malicious Web site hosted in China.Although the problem now appears to have been corrected, cached versions of some pages in the press section of CA.com show that... Read more...
End user demand for storage capacity is expanding exponentially year after year, as multimedia content, email, and document and file generation show explosive growth in this age of new media.  In addition, protecting that data is becoming increasingly more critical, with investments in digital... Read more...
First ... Prev 7 8 9 10 11