Tag: to
-
Intel Sees Record 2011, Looks to Mobile Push in 2012
Categories: Tech CompaniesIntel just completed a year in which it hit record financial numbers, including exceeding $50 billion in revenue for the first time, despite lingering softness in the core PC market. However, it will be the giant chip maker s performance in 2012 that will determine how it goes forward over the next few years. This… Read more
-
Apple, BlackBerry Most Common Devices Connecting to Corporate Networks: Report
The number of personal mobile devices connecting to the corporate network has more than doubled in the past two years—with nearly half of devices storing sensitive data, according to a report from security specialist Check Point Software Technologies. The report, "The Impact of Mobile Devices on Information Security," shows 71 percent of businesses believe mobile… Read more
-
AMD ‘Ultrathin’ Notebooks to Undercut Intel Ultrabooks by $200: Report
Advanced Micro Devices officials reportedly are not ready to concede the super-thin notebook space to Intel despite the headlines garnered by the larger chip maker s ultrabook strategy at the recent 2012 Consumer Electronics Show. During the event the week of Jan. 9, AMD officials outlined the company s plans for its upcoming Trinity platform,… Read more
-
Solid-State Disk Storage Costs to Fall in 2012: Nexsan
The current mindset regarding solid-state disk (SSD) drives is that they are extremely expensive, but the reality is that both SSD drives and systems have dropped in price significantly, making them a viable option for select applications in today’s IT environments. That’s according to a report from disk-based data storage systems provider Nexsan, which released… Read more
-
Firewalls and Firewall Management: Here to Stay
Contrary to some security experts’ proclamations over the past few years, the demise of the corporate firewall has been seriously oversold. While depending on the firewall and antivirus (AV) alone would be considered foolish in today’s time of sophisticated cyberattacks designed to elude these signature- and rule-based blacklist technologies, the truth is that the firewall… Read more