- Welcome Guest
- Sign In
The face of the Internet is rapidly changing. For instance, Web maps are no longer about finding your house online. A few years ago, map-making power remained in the hands of specialists. Today, map-making power is within everyone's grasp. In the past two years, Web giants like Google, Microsoft and...
Virtualization rootkits, Web application security and Voice over IP attack vectors topped Gerhard Eschelbeck's list of the top three biggest issues at this month's Black Hat USA conference, held Aug. 1 and 2 in Las Vegas. Eschelbeck is chief technology officer and senior vice president of security v...
Imperva specializes in data security and compliance solutions for the data center. Its product line provides an automated and transparent approach to protecting and controlling sensitive data throughout transactional data systems. The Imperva database and Web application appliances are deployed in l...
Competition is pushing all types of businesses toward greater mobility as companies ready plans to adopt mobile applications for core business activities. Business mobility has gone mainstream, according to a global survey conducted by Nokia and the Economist Intelligence Unit in cooperation with th...
As wireless operator networks carry more and more multimedia traffic, they must solve a basic problem: how to ensure that each application receives the appropriate level of service. Each layer of a multilayer protocol is good for some applications but bad for others. Today, operators can use a new "...
Today, most corporate CEOs come up through the ranks from either sales or operations. Fast forward a few years, though, and IT leadership may be a third route to the helm. A number of trends in recent years indicate that the role is evolving, said Martha Heller, managing director of the IT Leadershi...
A new upstart in online social networking, Ning, launched Tuesday, saying it plans to leapfrog social networking powerhouses MySpace and Facebook. Cofounded by Marc Andreessen, who also cofounded Netscape, Ning is a platform that lets people create their own social networks. The next generation of s...
Once considered the dark horse in solar's current race to the rooftop, solar concentrators are making a major comeback. Solar investment veterans RockPort Capital Partners and Nth Power recently led a US$8 million Series A round for Practical Instruments. The company plans to use the funds to launch...
As technology and business align closer to an open, Internet-driven world, the current security mechanisms that protect business information are not matching the increasing demands for protection of business transactions and data. A new generation of criminals is exploiting the very connectivity th...
IT security and information risk management has been high on the agenda of financial institutions for the past decade. It's little wonder due to the regulatory and organizational repercussions of a wholesale breach. Historically executives have concentrated on threats from "beyond the firewall," pro...
Few people hold the status of "visionary" in the computer processor field, but Sun Microsystems' Marc Tremblay fits the bill. Sun fellow, vice president, and chief architect for the firm's Scalable Systems Group, Tremblay foresaw the advent of "throughput computing" and the jump in performance affor...