Watch Out For The Worm
A vicious worm - the My Wife/Kama Sutra/Blackworm - is getting set to rear its ugly head this Friday the 3rd when it will arrive on unprotected PCs and destroy Microsoft Office files. Though experts have been sounding alarms for a couple of weeks about the malware which infects PCs once unsuspecting users open an email attachment and Microsoft issued a
Five Things You Need To Know About VoIP
Thinking of moving to VoIP, or you've already made the switch? Here's five things you have to know about VoIP when getting started, or getting up to speed, straight from
Linux Vulnerabilities Spur Enterprise Warning
Although most corporate customers do not officially use "raw" Linux products and so aren't in imminent danger, security experts say the situation makes it worth double-checking your software version levels
Mobile Shopping Just A Price Check For Now
Buying goods from a mobile phone is likely years away, but that doesn't mean retailers aren't investing in the world's most popular handheld device. For now, though, local search is
Linux Author Doesn't Back GPL 3
Linus Torvalds, the creator of Linux, is not supporting the new version of the General Public License. He's objected to a new proposal that would require people to make previously
Learning From The Best Of Business - And The Worst Of The Web
Seriously, is there really anything more irritating on the Web than those distracting graphical ads that rise over the Web page you are on, obscuring the text you are reading from view? Well, odd as it seems, the graphical overlay ads that drive most people crazy on the public Web turn out to be quite effective when incorporated into corporate Intranet sites, at least according Jakob Nielsen, principal of the Nielsen Norman Group. The N
Happy Friday! Time to celebrate the end of the week with a free toy! Centennial Software is heralding a new freebie from Sharp Ideas. Abe Usher's Slurp Audit is a free tool that provides information on what files might be...
Find out how much protection to expect from an intrusion detection system by building your own--for free!
Fiber Lets City Go Multimedia
Santa Monica's private CWDM fiber network has paved the way for new traffic-management and videoconferencing apps as well as free public Wi-Fi. Find out how this city is leveraging its
Geek Chic: Mplat's Flashphone F2K
Who says you can't take it with you? The $40 Flashphone F2K from Mplat Technology lets you plug into random PCs and make and receive free Skype VoIP calls.
Market Analysis: Continuous Data Protection
Restoring from days- and even hours-old backup won't get your company back in the game. Continuous data protection is the IT equivalent of no harm, no foul. We explain what
Testing Update: Registry Hacking
I'm really finished testing ESBs, but during the course of writing the article I often need to go back and double check something. I usually don't write at the lab (can't chain smoke around the servers) so I need to...
IT Gets Strategic
IT as a profit center? Well, maybe not today, but it does appear corporate execs want technology to play a greater strategic role in the business than in the past, at least judging from the results of a recent Gartner survey of 1,400 CIOs in which the respondents said they are increasingly being expected to do much more than help reduce corporate costs and guarantee information security. The Gartner found that business execs have
EC Grants Microsoft Extension; DoJ Says Tardy
The European Commission gave Microsoft an extension Monday to respond to charges relating to a 2004 antitrust ruling, while the U.S. Department of Justice took the company to task for
SonicWALL Releases SSL VPN For SMBs
SonicWALL, Inc. has announced a new addition to its Secure Sockets Layer (SSL) virtual private network (VPN) product line designed to meet the needs of small and mid-sized businesses (SMBs).
Why is Microsoft unique?
I was just reading a ZapThink report on Microsoft's new XAML-extensions for WWF (Windows WorkFlow) and got stuck again on one of Ronald Schmelzer's comments. Ron is quoted in several publications as saying: "Microsofts use of XAML as a way...
Broadcom Pays $80 Million For Sandburst
Broadcom Corporation is buying, for $80 million, mainly in cash, privately owned fabless chip company Sandburst, which specializes in chipsets for Ethernet and IP switches.
Cambridge Companies Combine For IPTV Systems
IPTV software and set-top box specialist Amino Technologies plc has bought, for ??1.3 million ($2.3 million) SJ Consulting Limited, which has developed and is licensing IP for video codecs to
Cisco Security Alerts Serve As VoIP Wake-Up Call
Cisco Systems' revelation last week of two security alerts and fixes for CallManager, the processing component of its voice-over-IP technology, reminds us that while VoIP offers all sorts of benefits, there's no getting around its vulnerability as a software application....
Last week's Systems Management Pipeline Poll asked if your organization has the security tools and policies in place to sufficiently protect your customer, employee, and other confidential enterprise data, and unfortunately, the answer was largely no. Given the number of high-profile incidents and the expectation that pending legislation will hold more busines
Well, after spending three hectic weeks in the lab testing ESB products, you can imagine that I've had to find a few interesting tools. Today's freebie is one of them. It's called XMOJO and it's an OSS JMX implementation, supporting...
Cisco Shuffles Execs, Creates New SMB Role
In its latest move to push deeper into the small- and midsize-business market, Cisco Systems late Wednesday created a new senior-level executive position to head its commercial business.
Stop with the e-mailS already!
It has come to my attention - usually painfully - that many people erroneously believe that the plural of e-mail is e-mails. It is not. Does the post office deliver mail, or mails? Yeah, exactly. "Hey, look at the mails...
Security Concerns Mount For Wireless Networks
Security is top-of-mind for businesses managing wireless networks, especially as they start adding new applications, such as voice over IP. Meru Networks' new offering scrambles malicious code at the radio-frequency
Going On The Offensive
Information security tends to rely on defensive measures, for pretty obvious reasons. A virus outbreak occurs, a patch is released. However, as many organizations are discovering the best defense is really a good offense. Enterprises need to get proactive to defend themselves effectively against threats such as bots that take over systems without the user's permission.
Prepare Your Company For WiMax
WiMax is no longer pie-in-the-sky -- it's becoming available in an increasing number of cities. Here's what you need to know and do to prepare your network for the next
Protecting Your Most Important Asset
Customer data is the most prized asset of business. Unfortunately, too many enterprises have not gone far enough when it comes to ensuring the protection of that information. Most companies are generally conscientious about data systems security but too many are guilty of not looking at the big picture and evaluating their full risk profile. That includes looking at physical security, and how data is handled by third-party partners including couriers. After all, a number of