TODAY'S TOP STORY
Top 10 Security Predictions For 2011
More malware, botnets, and mayhem, including online protests and political attacks, are in store for this year, according to security experts.
• Botnets Resurge After Holiday Break
• Sony Sues Hackers Over PS3 Jailbreak
• Hackers Could Game Wall Street With Network Latency
• Top 10 Security Stories Of 2010
Wikipedia's Jimmy Wales Celebrates 10 Years of Wikipedia
January 15 marks 10 years of Wikipedia. Can it be? Gina Smith caught up with Wikipedia founder Jimmy Wales to get his perspective on these phenomenal 10 years.
Review: Joomla 1.6 Boosts Business-Friendly Features
The open source content management system has addressed several key weaknesses, especially in rights and permissions management.
Mozilla Firefox 4 Beta 9 Available
Faster processing of bookmarks and history data arrives alongside many bug fixes.
Intel Soars To Record Earnings
Business spending, particularly in the data center group, led the chipmaker to income and revenue peaks in the fourth quarter.
What At Stake In IBM's Jeopardy Challenge?
Advances in assisted Q&A could find their way into medicine, legal, tech support and compliance applications.
Jive Suffers Major Cloud Outage
Enterprise collaboration specialist hit with service disruption that knocks customers' wikis out of the virtual sky.
DHS Invests $16M In Cybersecurity Testbed
The DETECT project will make improvements over the next five years to the Information Sciences Institute's DETERLab at the University of Southern California.
Google Promises No Planned Downtime
A new service level agreement (SLA) for Google Apps customers strives to make Google's cloud as reliable as dial tone.
Trio Of BlackBerries Leak
In addition to the leaked BlackBerry Dakota, details about the Storm 3, Torch 2, and latest Curve have also hit the 'net
Microsoft Warns Of Xbox Shortages
The software maker says strong holiday sales of Xbox 360 and Kinect could mean inventory levels won't be enough to meet demand in early 2011.
DOWNLOAD OUR JANUARY 17, 2011 DIGITAL ISSUE
Cloud adoption is in full swing. But ignore integration,
management, and monitoring at your peril.
• Real Costs Of The Cloud: An incomplete financial analysis
will end up biting you. We look at how to do a better assessment.
• Cloud Results: These four companies are way past testing the cloud.
They're looking at what's next.
DOWNLOAD NOW (Registration Required)
ANALYTIC REPORTS & WHITEPAPERS
Eliminating Vulnerabilities In Enterprise Software
Most of the hacks that compromise enterprise security today are those that exploit flaws in applications. How can organizations find and fix these vulnerabilities -- before they lead to a breach? In this special Alert, Dark Reading offers a look at some tips and tricks for software development and vulnerability assessment, as well as some advice on how to eliminate security flaws in the enterprise.
Download Now (Registration Required)
Hardening Next-Gen Web Applications
Slick interactive applications have opened up new vistas of opportunity for businesses--and for attackers seeking to make off with data. In this report, we provide an in-depth analysis of the challenges around secure dynamic apps without stifling the very attributes that make them so popular with end users and customers.
Download Now (Registration Required)
The Compliance Trap
Compliance for compliance's sake is not a best practice in protecting cardholder data.
Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls. Download Now
The Cloud-based Telework Solution
By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale. Download Now
Windows Phone 7 Gets Lock Down Treatment
By Ed Hansberry
Along with the much anticipated copy and paste functionality, Microsoft will also be blocking unlock tools like ChevronWP7.
Verizon iPhone, Can You Still Hear Me Now?
By Kurt Marko
By now everyone knows that Big Red is finally getting the iPhone, but as a happy DroidX user and long-time (15+ year) Verizon customer, I greet this with mixed emotions. Obviously the iPhone 4 is probably the slickest, most elegant app phone out, although not so much that I'm going to rush out, pay the full-freight unsubsidized price and ditch my six-month old Droid. Really, I'm happy Verizon and Apple have come to terms and look forward to an LTE iPhone 5 later this year (or whenever LTE comes to my hometown). No, my concern is for Verizon's network.
Backup Deduplication 2.0 - Integration
By George Crump
Deduplication has moved from a risky hard to explain technology to one that is almost expected by customers from a disk backup device. Next generation backup deduplication systems are going to require a new set of capabilities to make them more than just disk backup. They will have to integrate with the backup software, begin to provide power management, and there needs to be a greater focus on recovery performance.
Is The SMB Server Market A Bubble?
By Lamont Wood
Some say the sky is going to fall in 2011. But what's been holding it up?
Ask A Question, Save A Business!
I am always amazed by my customer's lack of willingness and acceptance to admit they have issues, problems or the fact that they are not fully realizing the benefits from a current process, tool, recent service, or system implementation.
SMBs Look Ahead To Mobile Commerce
By Michele Pepe-Warren
Pop Quiz: Which is the most popular wireless device among SMBs: a) Apple iPad b) Android c) good ol' cellphone (voice and text only)? Did you pick a), feeling confident that forward-looking entrepreneurs can't resist Apple's latest power gadget? How about the Google-based Android? No doubt, the TV ads promise a sort of futuristic high for those who harness its power.
This issue sponsored by DotNetNuke Corp.
Learn from Government Experts Coleen Cason (Webmaster, York
County,VA) and Brad Laing (Technology Manager, City and County
of Denver) how they used Open Source to build secure Web Sites.
Complimentary Webinar (1/20/11 at 10 am PST). A Webinar
recording will also be sent to all registrants. Register Today!