Recent Articles
-
Xerox Acquires ACS for $6.4 Billion
Xerox is moving away from its roots as a photocopier and document management leader to full systems integration and IT services with the acquisition of solution provider giant Affiliated Computer Services for $6.4 billion. "By combining Xerox’s strengths in document technology with ACS’ expertise in managing and automating work processes, we’re creating a new class…
-
M86 Security Takes on Bigger Vendors
Just a few weeks after a name change and a little under 11 months after a merger between Marshal and 8e6 Technologies, M86 Security has high aspirations to take on major security players such as Websense and McAfee in the secure Web gateway market with the help of a new slate of products and a…
-
i3, Datatrend Team for Packaged IBM Solution
i3 Software and Datatrend today announced they will provide joint network management and monitoring solutions. Together, the two companies, both IBM reseller partners, will provide a packaged IBM BladeCenter and Tivoli solution to the telecommunications, banking and retail industries. The relationship plays on the strengths and experiences of each company. i3 will provide Tivoli integration…
-
CSC Gets Contract to Drive Nissan IT
Nissan North America, the subsidiary of the Japanese carmaker that manufacturers cars and trucks for the U.S., Canada and Mexico markets, has contracted with Computer Sciences Corp. for help desk, mobile computing and IT infrastructure support. The value and duration of the contract is unspecified. But the goal of the engagement is cost-cutting to help…
-
Startup IT Structures Builds Virtual IT Environments
Is this scenario familiar to you? You are on a sales call and it’s going well. After a nice long conversation and a WebEx presentation, the customer says he thinks your software might be a good fit for his company. You think it’s a done deal. Then, “Can we try it out first?” That’s when…
-
Password, ID Stealing Malware Volume Jumps 400%
Clampi, the Trojan that Secure Channel wrote about yesterday, is a fine example of why we’ll never see another Code Red, Nimda or LoveLetter virus again. The intent of malware is no longer to cause mass service disruptions, but rather to steal as much information as possible without getting detected. Trojans, worms, viruses and rootkits…