Recent Articles
-
Apple’s iPad 2 Tops Consumer Reports’ Tablet List
Consumer Reports may have longstanding issues with the iPhone 4, but its editors have decided to give a big thumbs-up to the new iPad 2. The publication tested 10 tablets, including the Motorola Xoom and Samsung Galaxy Tab, before deciding that the 32GB iPad 2 with WiFi and 3G ranked highest across 17 criteria ranging…
-
CSC Acquires Healthcare Software Provider iSoft
(Reuters) – U.S. technology services provider Computer Sciences Corp (CSC) said it would acquire healthcare software provider iSOFT Group Ltd for about $188 million. Computer Sciences will offer iSOFT shareholders A$0.17 a share, 224 percent more than iSOFT’s March 24 close on the Australian Stock Exchange. "When completed, this acquisition will be a critical step…
-
Cloud Storage: Is a Standard Needed?
SANTA CLARA, Calif. — To the surprise of virtually no one who works in or follows the enterprise IT world, a new survey reported that cloud computing services and system building continue to become more prominent in both augmenting and replacing older data center equipment. In addition, the research indicated that the Storage Networking Industry…
-
RSA SecurID Breach: Spear Phishing Email Blamed
In spite of a surfeit of security technologies that it develops to detect fraud and malicious activity on networks in real-time, it seems that security firm RSA was unable to detect a targeted phishing attack last month before attackers took information related to the company’s SecurID authentication products. Over two weeks after informing its channel…
-
EMC Mozy Intros Cloud Storage App for iPhone, iPad
If consumer software makers don’t know this by now, they must be living in some other world. It’s now mandatory to make your application work on devices other than notebook and desktop PCs. They had better be optimizing their handiwork for smartphones, connected music players and tablets, or they’ll be missing the train. Cloud storage…
-
Phishing Attacks Decline as Vulnerabilities Rise: IBM
Cyber-criminals shifted focus in 2010 to launch more sophisticated targeted attacks, IBM said in a new report. In short, 2010 was the year cyber-attacks became more about quality rather than quantity. While there was an increase in new vulnerabilities, exploits and types of attacks in 2010, more vulnerabilities were being identified before they could be…