Search

IT News

Cisco execs address defective memory component issues with routers, switches

Cisco executives in a roundtable session with reporters this week addressed the industry’s memory component degradation issue in products developed between 2005 and 2010. Cisco’s taking a $655 million charge to address remediation actions customers are taking to replace products that include the defective memory components....

07.03.2014

Bitcoin creator Satoshi Nakamoto reportedly found

Secretive Bitcoin creator Satoshi Nakamoto is a 64-year-old man living near Los Angeles who declines to talk about his role in the digital currency, according to a news report....

07.03.2014

Cisco revamps enterprise product pricing

In an effort simplify enterprise customer procurements, Cisco is implementing a licensing model for data center, WAN and access product purchases....

07.03.2014

Why you need to segment your network for security

Pen tester Mark Wolfgang argues segmenting for security is a key piece of an overall defense-in-depth strategy. Here he explains why and how to accomplish it in your organization (registration required)...

07.03.2014

Patch Tuesday: Microsoft to address IE problems

Microsoft is issuing five security bulletins this month, two of them critical and affecting all versions of Internet Explorer as well as all versions of Windows from XP to 8/8.1....

07.03.2014

U.S. spy agencies adopt new IT approach

The CIA's decision to use Amazon's cloud is part of a broader IT shake-up to make the spy business more efficient....

07.03.2014

Five things to know about malware before driving it out

In today's network environments, malware that evades legacy defenses is pervasive, with communication and activity occurring up to once every three minutes. Unfortunately, most of this activity is inconsequential to the business. You would think that would be good news right? The problem is that incident responders have no good way of distinguishing inconsequential malware from (potentially) highly damaging malware. As a result, they spend way too much time and resources chasing red herrings while truly malicious activity slips past....

07.03.2014

More networking news,features and forums

...

06.03.2014

12 Ways to Disaster-Proof Your Critical Business Data

How can you keep critical data safe when disaster strikes? There is no one magic answer, but there are steps your business can and should take to protect important files and applications in the event of a disaster....

06.03.2014

NIST seeks to bring rigor to data science

The U.S. National Institute of Standards and Technology (NIST) wants to bring some metrics and rigor to the nascent but rapidly growing field of data science....

06.03.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker