- Welcome Guest
- Sign In
Information technology managers are facing a massive rollout of new demands and computing models that could potentially make inroads in enterprise computing in 2008. As the technology continues to evolve and the landscape continues to change, IT managers have to pick and choose carefully in deciding...
I've been talking about heroes for several weeks now, most recently the folks at HP who are overcoming the company's internal bureaucracy to turn what had been a problem unit -- its PC unit -- into the most powerful PC entity in the world. But inside HP another group of unsung heroes are those that ...
What is virtualization anyway? The short answer is, virtualization is separating the physical layer from the logical layer -- the operating systems and applications. You can virtualize pretty much any aspect of IT. "There is no universal definition of virtualization as it means many things to many p...
In 2005, notebook computers accounted for 50.1 percent of all computer sales. In 2006, shelf space for notebooks increased 44 percent while desktop shelf space went down by 23 percent. What does this have to do with a data center? Everything. At Journyx, where I manage IT, we presently have about 25...
Study after study continues to reveal a fundamental truth about the shifting landscape of IT security today: The biggest threat to proprietary systems and information is not the traditional cyber-criminal writing malicious code in a virtual location, but rather trusted employees. Savvy administrator...
"Do you remember where you were on Y2k?" Ask that of most IT professionals and you're almost sure to get a conversation started. While the non-IT crowd was off partying like it's 1999, many of us spent the new year in the office, on call or tied to our pager. Even those of us who weren't directly in...
Ever heard of a tarpan? In case you haven't, the tarpan is the ancestor of the modern domesticated horse. They roamed the forests and steppes of Europe and Asia for thousands of years -- all the way from southern France to central Russia. Over time, everything around them changed -- their habitat di...
Organizations are being pressured to extend the delivery of actionable information to all people when, where and how they need it. This requires that companies have the ability to combine, aggregate and integrate information to ensure that it reaches its intended audience in the most timely and effe...
Despite improvements in system and network security, wily cybercriminals remain a significant threat, adjusting their methods to take advantage of unwary Internet users, the SANS Institute says in its report on the top 20 Internet security risks of 2007, released Tuesday. Hackers and cyberspies have...
Vinton Cerf, known by many as one of the founding fathers of the Internet, will be stepping down at the end of this week as chairman of the board of ICANN. Cerf, who is also Google's vice president and chief Internet evangelist, has served for three consecutive terms as chairman of ICANN, which is t...
Time Magazine's Person of the Year for 2007 is You. To summarize their lengthy coverage of this topic, it's all "Web 2.0" technology that enables user-empowering Web tools and Web sites like Wikipedia, YouTube, MySpace, Flickr, Google Maps, Twitter, Pandora, Last.FM, Digg, and Del.icio.us. These We...
Computer security company FireEye announced on Monday a new strategy for fighting the worsening threat to consumers and businesses posed by botnets. The company announced its new Botwall appliance, linked to a worldwide intelligence network coupled to local botnet analysis designed to thwart attacks...
It sounds tremendously obvious to say it this way, but applications are everywhere. Think about it. Your office suite, your e-mail reader, even the software you're using right now to read this -- these are just a fraction of the thousands -- if not hundreds of thousands -- of applications you use d...
Electronic payment systems create an ecosystem -- the actions of one participant have an impact on all. This has been seen repeatedly when a single organization fails to protect consumers' payment data, resulting in increased costs for all retailers and banks. Each time there is a breach, such as t...
As colleges and universities nationwide began installing broadband access to their dorm rooms and apartments years ago, they gave students convenient, at-home access to unprecedented amounts of information. The trend also played a significant role in opening the door to peer-to-peer file-sharing net...