Search

IT News

Target CEO resignation highlights cost of security blunders

The massive data breach that tarnished the career of Target Chief Executive Gregg Steinhafel and contributed to his resignation is a reminder of the worst-case scenario facing CEOs caught in a security SNAFU....

06.05.2014

Little-known Cisco open source project among contributors to OpenStack Neutron policy blueprint

Multiple vendors, including an open source project within Cisco, have had a policy blueprint approved for the OpenStack cloud platform’s Neutron networking component....

06.05.2014

Are your pipes too big?

A few years ago, I was involved in a consulting project with a large company in the healthcare industry that was in the middle of a data center migration. After the networks and servers were stood up at the new location they needed to migrate massive amounts of data in bulk so the company secured a pair of OC192 circuits, providing nearly 10Gbps of throughput in each direction on each circuit. ...

06.05.2014

More networking news,features and forums

...

05.05.2014

Retailers plodding toward accepting higher-security payment cards

Target is speeding up support for chip-and-PIN payment cards to restore consumer confidence shaken by last year's massive data breach. But many other retailers feel less of an urgency to adopt the more secure technology....

05.05.2014

Google breaks out Docs, Sheets from Drive mobile app

Google is releasing separate mobile apps for its Docs, Sheets and Slides apps, breaking them out from the Google Drive storage service where they used to reside....

05.05.2014

The changing fortunes of Net neutrality

Network neutrality is a term coined more than a decade ago by Columbia Law professor Tim Wu, and describes an equal-treatment approach to Internet traffic handling. In 2010, I wrote in Network World about the Net neutrality conversation then in progress. Now, during the first few months of 2014, a few interesting things have developed and Net neutrality may be a useful lens through which to consider them....

05.05.2014

Worm-like Android malware spreads using text messages

A piece of malware targeting Russian-speaking Android users abuses a person's contact list to try and infect other devices, according to security vendor Eset....

05.05.2014

Windows XP users widely ignore end-of-support warnings

Despite a known browser vulnerability and lacking security support, Windows XP remains the second most popular PC operating system, according to NetApplications....

05.05.2014

Fast, cheap and easy: Five IT certifications that won't break you

Achieving any certification worth its salt is never easy, but some are faster to complete than others -- and easier on your wallet as well. Here are five worth considering....

05.05.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker