Recent Articles
-
It’s Time to Take VOIP Seriously
Voice over IP is finally coming into its own. Studies show the technology is gaining serious traction in businesses of all sizes and its use in small companies is expected to triple during the next three to four years. A survey conducted by CompTIA (Computing Technology Industry Association), in Oakbrook Terrace, Ill., found that convergence…
-
Is Dell Partnering with the Channel?
Dell and the channel are secretly growing fond of each other. More and more VARs (value-added resellers), indifferent to shrinking hardware margins and prodded by price-sensitive customers, say they are buying Dell computers for their clients. The Round Rock, Texas, PC maker embraced resellers by granting them visits from account representatives, sales support and even…
-
Report Anticipates Increased IT Brain Drain
The Government Accountability Office released a study May 3 which found that the proportion of postsecondary students obtaining degrees in STEM (Science, Technology, Engineering, and Mathematics) fields has fallen significantly. While 32 percent of postsecondary students obtained degrees in STEM fields in 1994 and 1995, the percentage fell to 27 percent in 2003 and 2004.…
-
IBM Aims Blades at SMBs
IBM wants to entice more SMBs to take a look at its blade server offerings. The Armonk, N.Y., company on May 10 is unveiling a host of new features and offerings aimed at making it easier for small and midsize businesses to adopt blade servers, the fastest growing of all server form factors. Among the…
-
Symantec Plans End-to-End Enterprise Security Service
Security vendor Symantec announced plans May 9 to extend its Business Critical Services of advanced security and availability offerings across its enterprise portfolio, creating an end-to-end security service package. The offering marries the legacy service programs of Symantec and Veritas, acquired by Symantec in 2004, and aims to provide enterprises with an integrated security support…
-
Solsoft Taps Channel for Its Network Security Software
Configuring network devices to implement security policies can easily turn into a nightmare. Between routers, switches, intrusion prevention systems and an array of other equipment with brands such as Cisco Systems, Symantec and Juniper Networks, wading through the lines of code to make these devices conform to the same security policy is nothing short of…