Year: 2012
-
Firewalls and Firewall Management: Here to Stay
Contrary to some security experts’ proclamations over the past few years, the demise of the corporate firewall has been seriously oversold. While depending on the firewall and antivirus (AV) alone would be considered foolish in today’s time of sophisticated cyberattacks designed to elude these signature- and rule-based blacklist technologies, the truth is that the firewall… Read more
-
1. His Management Changes Were Right
Categories: Tech Companies1. His Management Changes Were Right Ballmer has appointed his own leadership team over the past few years. These were changes intended to imprint his mark on Microsoft’s culture. As many of those division leaders deliver products this year, all eyes will be on Ballmer to see if his management decisions were right. 2. Tablets… Read more
-
Novell Launches ZenWorks Application Virtualization Platform
IT systems software specialist Novell announced the release of ZenWorks Application Virtualization 9, which leverages an approach to application harvesting that is designed to enable enterprise IT staff to tap into a library of resources and find the best stored version to build the virtual application dynamically. By harvesting work that has already been done,… Read more
-
Intel Ultrabook Sales Spur Growth in Cache SSDs: IHS
Booming sales of Ultrabooks spurred by strong support from Intel will drive explosive growth in the market for cache solid state drives (SSDs) in the coming years, with shipments set to soar more than a hundredfold by the end of 2015, up from less than one million units in 2011, according to an IHS iSuppli… Read more
-
Blackberry PlayBook Tablet Security Flaw Uncovered
Research in Motion (RIM), the company behind Blackberry smartphones and the struggling PlayBook tablet, faces a new security threat after Ben Nell a consultant with the Intrepidus Group, and colleague Zach Lanier, a principal consultant with Intrepidus, announced the flaw during the Infiltrate Security Conference in Miami this week. The security flaw allows hackers to… Read more