Search

IT News

Quick guide: Which freaking database should I use?

The big data era calls for NoSQL databases. Explore the new alternatives to old RDBMS and find out which one is best for you...

28.02.2014

Cisco fixes unauthorized access, denial-of-service flaws in several products

Cisco Systems has released security updates to fix serious vulnerabilities in a range of products including its Intrusion Prevention System, Unified Computing System Director, Unified SIP Phone 3905 and Firewall Services Module products....

28.02.2014

Why companies need to check their handling of internal threats

Security pros should reevaluate their use of technology and policies to bolster defenses against insider threats that many organizations downplay, a new study shows....

28.02.2014

Three essential steps to a software defined data center

Imagine this in your data center: A swath of compute, networking and storage hardware from a variety of different vendors that are all controlled not individually but by software that overlays the entire operation....

28.02.2014

Juniper unveils new operating plan to accelerate growth

Juniper Networks, as promised, this week announced a new integrated operating plan (IOP) to refocus the company on high growth segments in the networking industry....

28.02.2014

Juniper, Nokia hooking up?

Nokia is reportedly considering acquiring Juniper Networks and combining it with its Nokia Solutions and Networks (NSN) business to increase U.S. service provider market penetration....

28.02.2014

A kindly reminder from Google: Don't be a Glasshole

What's the etiquette for using Google Glass in public? The answers aren't always obvious, so Google has provided some tips....

27.02.2014

More networking news,features and forums

...

27.02.2014

Intel lays down case for software focus

For decades, Intel chips would be unboxed and put straight into computers. But the chip maker is now trying to tie software closer to hardware before it starts producing chips, said CEO Brian Krzanich on Wednesday....

27.02.2014

How to rethink security for the new world of IT

Not all the proven practices of the past work in today's interconnected, heterogeneous world. Here's what you need to do differently...

27.02.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker