• McAfee’s Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy

    More than 1,200 new rootkits are detected each day. Here's how security experts combine hardware and software techniques for a new layer of protection.

  • Will a Mobile OS Update Break Your Apps?

    When mobile operating system vendors update their platforms, third-party apps sometimes stop working. Here's why -- and how to prevent your app from being the next one that breaks.

  • Maximizing Cloud Uptime

    Cloud computing helps enterprises reduce IT CAPEX and access the latest systems, but Virtualization for Dummies author Bernard Golden explains the danger in underestimating factors that affect cloud access and uptime.

  • Security Issues for Multicore Processors

    Multicore processers are increasingly common in everything from PCs to smartphones -- and increasingly attractive to hackers. Cambridge University researcher Robert Watson explains the threats and how enterprises can mitigate them.

  • Who’s in Charge of Multicore?

    Markus Levy, president of The Multicore Association, illuminates initiatives developers should keep an eye on, including an API designed to make parallel programming easier.

  • The Long-term Commitment of Embedded Wireless

    Wireless machine-to-machine (M2M) communications gives enterprises new options for tracking assets, reducing overhead costs, ensuring employee safety and delivering value-added services. But what happens when the underlying wireless technology gets phased out?