News

News

  • September 28, 2006 28 Sep'06

    BlackBerry Pearl and other slick devices bring new challenges

    BlackBerry this week unveiled its Pearl, a slick handheld that makes older BlackBerrys appear clunky and antiquated. What can mobile managers expect as these hot new devices infiltrate the market and eventually the enterprise?

  • September 26, 2006 26 Sep'06

    Unsecured devices worry IT professionals

    IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.

  • September 14, 2006 14 Sep'06

    SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.

  • September 07, 2006 07 Sep'06

    Mobile workers push for smartphones

    Road warriors may prefer smartphones over laptops and PDAs, but equipping your entire mobile workforce with this nifty tool may not be such a great idea.

  • August 31, 2006 31 Aug'06

    Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.

  • Sponsored News

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    • Improve Security with Managed File Transfer

      File transfer is one of the vital functions of B2B collaboration. Organizations require safe, secure and compliant file transfer in order to drive revenue, satisfy customer requirements and enable effective collaboration across the entire B2B value chain. See More

    • Leveraging Cloud Models to Simplify B2B Collaboration

      Reducing complexity in managing business-to-business integration is one of the primary challenges for IT teams. With the growth of the Internet of Things (IoT), social networking and big data analytics, the need to simplify partner interactions and automate processes is becoming more critical than ever. By simplifying B2B collaboration, IT can reduce costs, enhance partner and customer experiences, and leverage real-time visibility and analytics to drive business innovation. See More

    View All Sponsored News
  • August 25, 2006 25 Aug'06

    Symantec peddles enterprise vault tool

    The new Enterprise Vault software contains features developed because of a recent update to the Federal Rules of Civil Procedure.

  • August 22, 2006 22 Aug'06

    McAfee sued for patent infringement

    DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.

  • August 17, 2006 17 Aug'06

    Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

  • August 17, 2006 17 Aug'06

    Mobile Platforms: Palm OS -- not the best for the multitasker

    Mobile managers face a tough choice when weighing which mobile platform or operating system to deploy. We've assembled a team of experts and asked them to weigh the good and bad of each mobile platform to help you choose the one that's right for ...

  • August 17, 2006 17 Aug'06

    Sun exec says Java ME release will push Java-Linux meld

    Sun's VP Rich Green talks about the pending software release from Sun that he thinks will result in more innovative applications on open source platforms.

  • August 17, 2006 17 Aug'06

    Antivirus researcher Gullotto leaves Symantec for Microsoft

    One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.

  • August 17, 2006 17 Aug'06

    BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, ...

  • August 10, 2006 10 Aug'06

    Compliance software essentials: Build a technology toolbox

    There's really no one technology answer for regulatory compliance. Companies need a variety of tools to effectively meet the requirements of regulations such as Sarbanes-Oxley.

  • August 07, 2006 07 Aug'06

    Ajax threats worry researchers

    Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.

  • August 04, 2006 04 Aug'06

    Image-based spam scams on the rise

    By using images instead of text, spammers are invading your inbox with a lot more than offensive language. Not only are the emails vulgar and invasive, but they're also creating huge storage and bandwidth problems.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchEnterpriseLinux

SearchDataCenter

SearchExchange

SearchContentManagement

Close