Why You Need Double Protection Now: Hardware and Software
Developers unite software and hardware-based security to reinforce laptop, web site defenses.
Developers unite software and hardware-based security to reinforce laptop, web site defenses.
VoIP softphones are abundant and enabling; some even support video calling. Here’s how to determine whether it’s time to ditch desk phones — and how to do it.
Cloud computing provides numerous benefits, including cost savings. Here’s how to avoid creating security risks in the process.
So-called “bare metal” client hypervisors have been discussed for years, but only recently have emerged as a tangible option for enterprise IT managers.
Self-service business intelligence is about to transform data analysis, and IT infrastructure needs to be ready for the onslaught.
The rise of multiple NoSQL database technologies has database gurus scratching their heads about the suitability of NoSQL solutions for enterprise.
Is parallel programming as hard as it sounds, or does it just require a fresh mindset and access to the right tools?
Analyst Peter Christy explains the ways virtualization enables an entirely new structuring of IT within an enterprise.
Ubiquitous computing is moving out of the lab and into the mainstream. Bo Begole, head of PARC’s Ubiquitous Computing Area, explains what it means for enterprises and consumers.
With new tablets and other mobile devices, developers need to port existing apps to take best advantage of the new platforms.
Find out what’s in store for credentialing secure mobile-application developers from those who offer the security seal of approval.
Russian-based IP accounts drive 10 percent of attacks, most of which target port 445.