Expert Analysis
Content posted in August 2011
<<   <   Page 4 / 4
iPhone Top Device For In-Flight Browsing
Commentary  |  8/2/2011  | 
Apple iPhone makes up nearly two-thirds of all devices accessing Gogo's airborne Wi-Fi Internet service.
eEye Improves Vulnerability Prioritization Capabilities
News  |  8/2/2011  | 
CS Management 2.5 helps enterprises decide which bugs to patch first, based on their own IT and business environment.
Ricoh Picks Vidyo Technology For Portable Videoconferencing System
News  |  8/2/2011  | 
Ricoh, best known for printers and copiers, is getting into the growing UC market, adopting scalable video coding technology from Vidyo for a portable videoconferencing system. The Ricoh Unified Communication System P3000 model delivers high-definition, multipoint videoconferencing, as well as the ability to share documents and photos, using a 3.5-pound portable room system.
Today's Deal: Google Buys Dealmap
News  |  8/1/2011  | 
Snubbed by Groupon, Google puts itself on daily deals map with deal for special offers aggregator.
5 Marketing Blunders That Twitter Could Have Stopped
News  |  8/1/2011  | 
Twitter helped save the debt ceiling deal, White House says. Could it have prevented New Coke or Microsoft Bob?
Nimbus Data Goes All In With Flash-Only Storage
News  |  8/1/2011  | 
Storage vendor Nimbus Data is one of the first to introduce an all-flash network storage system. The market for flash--or solid-state disk (SSD)--storage is limited, because SSDs are typically more expensive than hard disk drive (HDD) storage. However, Nimbus calculates that the total cost of ownership for SSDs is less than with HDD storage when the costs of power, cooling and software licenses are factored in.
Black Hat Will Once Again Show Our Security Weaknesses
Commentary  |  8/1/2011  | 
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.
Shortened Breach Disclosure Periods Could Hurt Consumers
News  |  8/1/2011  | 
Breach notification window in proposed law will make disclosure less beneficial to victims, say security experts.
BeyondTrust Acquires Data Loss Prevention Startup GentleSecurity
News  |  8/1/2011  | 
Privileged access management provider BeyondTrust has acquired a startup company for its data loss prevention technology. The acquisition of GentleSecurity is the third such deal this year for BeyondTrust as it seeks to broaden its solutions to protect IT systems from insider threats by controlling who has access to what parts of the network.
eEye Improves Vulnerability Prioritization Capabilities
News  |  8/1/2011  | 
The new release of eEye Digital Security’s CS Management product improves enterprise ability to prioritize remediation and mitigation of known vulnerabilities. Version 2.5 of the vulnerability management offering also adds support for mobile devices and free patching for select non-Windows applications.
<<   <   Page 4 / 4

Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Twitter Feed