Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Those who plan to sneak in a couple hours here, a couple hours there to do some holiday shopping while at work can, perhaps, take comfort in the fact that they're not alone.Not even close.Apparently, employees, on average, plan (plan!) to... Read more...
Symantec has released a report (.PDF) on what it calls "rogue security software." According to the report, Symantec has detected over 250 distinct rogue security software programs, and during the timeframe of the report, July 2008 - June 2009, 43 million attempted downloads of such rogue... Read more...
While Symantec and other antivirus firms may make gibes at Microsoft's free Security Essentials antivirus, Microsoft reportedly offered the product in order to increase AV coverage in regions where people can't afford to pay for one. At... Read more...
Although still in its infancy, data loss prevention software is becoming increasingly important for companies who wish to protect the accidental and intentional release of sensitive information. To assist, Sophos introduced free programs... Read more...
After some iPhone users have reported receiving phone calls from the publisher of a free app they've downloaded from the App Store, users have begun to wonder: how did the company get my contact information? Since Apple does not provide contact information for users to App Store vendors, the... Read more...
IBM has been a name synonymous with computers and technology for nearly 30 years. That point alone leaves little doubt as to why Lenovo moved to acquire IBM’s Personal Computing Division in 2004. When the acquisition was finalized in 2005, Lenovo instantly became a global PC leader. Over the... Read more...
We made our annual pilgrimage to Intel Developer Forum this year and upon arriving in sunny San Francisco, we were greeted with the usual IDF fanfare in a sleek, modernistic environment.  Presentations and demonstrations of Intel's latest... Read more...
With the growing popularity of inexpensive netbooks and nettop PCs, the Linux operating system (often installed on the lowest-priced budget units) is reaching a wider audience--although nowhere close to giving Windows or the Mac OS a run for their money (albeit Mac OS X is based on a Unix... Read more...
VIA Launches ACE-CNX Customized Security ServiceVIA ACE-CNX provides tailor-made data security through hardware-based data encryption Taipei, Taiwan, 1 September 2009 - VIA Technologies, Inc, a leading innovator of power efficient x86 processor platforms, today announced the VIA ACE-CNX... Read more...
Here's a little known fact: Twitter and Facebook are erupting in popularity. Both social networks have taken the underground and mainstream worlds by storm, and everyone from your next door neighbor to your favorite celebrity is likely within reach. This new world of information can be... Read more...
As if you really needed one more reason to take the car, ferry or bicycle to your next destination, the Department of Homeland Security has just issued another update to its long list of search rules that'll most certainly spark up some... Read more...
Thinking of using those newfound hacking skills to engage in nefarious behavior? Think again. Albert Gonzalez is a name that'll go down in hacking history, but it's not for anything positive. After being charged with stealing some 130... Read more...
With the growing popularity of cloud-based storage solutions, such as the Amazon S3 and Nirvanix services, many businesses--both large and small--are eschewing traditional onsite file servers, and instead opting for offsite, third-party storage solutions. But the ongoing cost of maintaining... Read more...
With the growing popularity of cloud-based storage solutions, such as the Amazon S3 and Nirvanix services, many businesses--both large and small--are eschewing traditional onsite file servers, and instead opting for offsite, third-party storage solutions. But the ongoing cost of maintaining cloud-based storage as well as the often unproven... Read more...
Remember all that hoopla surrounding President Obama's use of a standard BlackBerry? Surely you recall just how crazy our government is when it comes to security, so we're not shocked in the least to hear that SanDisk is caving to those strict requests in order to get its Cruzer flash drive... Read more...
More than half of computer viruses last a mere 24 hours.Panda Security's malware detection laboratory, PandaLabs, has been analyzing the nearly 37,000 samples of new viruses, worms, Trojans and other security threats that it receives each day and found that 52 percent of them work for just 24... Read more...
Regardless of their size or industry, most businesses depend on ready and secure access to their data. To a business, "secure" means that its data is protected from hardware or software failures and is safe from prying eyes. But small and even some medium-sized businesses often can't afford to maintain a data center, let alone a dedicated... Read more...
Mac users who've been smug for years over how secure their OS is, could be in for a rude awakening if news out of the Black Hat Security Conference is true.As Macs have slowly gained market share on PCs — 9 percent of the market in the second quarter of 2009 and growing — the interest in... Read more...
The rise of social networking has given rise to a whole new species of cyber criminals, experts warn.When people sign up on Facebook, for example, they tend not to think twice about putting in their birth date. But combine that with all sorts of other personal data in your profile — contact... Read more...
When doing research for a new graphics card, mainstream users might come across a professional workstation-class video card and wonder what all the fuss is about. On the surface, one must look at the enormous price differences and question the justification when technically the hardware... Read more...
One of the iPhone 3GS's new features is hardware encryption. This should make it more suitable for business, but as its purportedly in hardware, it's unavailable to other iPhone models. It can also be cracked in two minutes, using nothing more than freeware, according to Jonathan Zdziarski, an... Read more...
It seems as if you have to come up with a new password with upper and lower case, symbols and numbers every five seconds. So the idea of having a secure external hard drive that needs no password seems rather intriguing.Freecom came out with a relatively small external drive that uses a... Read more...
First ... Prev 121 122 123 124 125 Next