News

News

  • May 31, 2006 31 May'06

    App security tools target Ajax vulnerabilities

    Security vendor Cenzic adds Ajax testing capability to its automated vulnerability assessment offerings, while Denim Group releases an open-source vulnerability scanner.

  • May 25, 2006 25 May'06

    Spammers hijack authentication mechanisms to send malware

    Content filtering provider AppRiver reports an attack gaining momentum by using trusted systems to push malware before anyone notices.

  • May 24, 2006 24 May'06

    Email archiving: What's right for your enterprise?

    There is a growing need to archive email data, and today there are several ways to do it. Stop to consider what would work best for your enterprise.There is a growing need to archive email data, and today there are several ways to do it. Stop to ...

  • May 22, 2006 22 May'06

    Email archiving: Should storage pros keep everything?

    From conniving lawyers to dodgy tape practices, here are some of the juicy tidbits we heard on the show floor and during sessions at Storage Decisions.

  • May 18, 2006 18 May'06

    BlackBerry extends mobile applications without e-mail

    BlackBerry maker Research In Motion Ltd. has a new server that pushes out MDS applications independently of e-mail.

  • Sponsored News

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    • Improve Security with Managed File Transfer

      File transfer is one of the vital functions of B2B collaboration. Organizations require safe, secure and compliant file transfer in order to drive revenue, satisfy customer requirements and enable effective collaboration across the entire B2B value chain. See More

    • Leveraging Cloud Models to Simplify B2B Collaboration

      Reducing complexity in managing business-to-business integration is one of the primary challenges for IT teams. With the growth of the Internet of Things (IoT), social networking and big data analytics, the need to simplify partner interactions and automate processes is becoming more critical than ever. By simplifying B2B collaboration, IT can reduce costs, enhance partner and customer experiences, and leverage real-time visibility and analytics to drive business innovation. See More

    View All Sponsored News
  • May 17, 2006 17 May'06

    With Microsoft's Atlas toolkit, no wait for Ajax controls

    With two releases in the last month, the Atlas Control Toolkit is giving developers Ajax controls for ASP.NET apps long before Atlas is due for release. Soon developers will be able to submit their own controls as well.

  • May 15, 2006 15 May'06

    Symantec taps Dell to fix e-mail archiving support

    Admitting that its support for Enterprise Vault has been a problem, Symantec plans to lean on Dell to sell and support the software worldwide.

  • May 09, 2006 09 May'06

    Mobile device trends: Security, consolidation and more

    In a recent report, J.Gold Associates outlined the direction in which mobile devices will be heading in 2007 and 2008. Security is high on the list, while other trends such as consolidation and multi-modal user interfaces start generating some real ...

  • April 26, 2006 26 Apr'06

    Virus onslaught sickens smartphones

    Mobile viruses are still somewhat of an unknown. They're out there, but they've only just begun. What are they, what do they do, and what can you do for protection?

  • April 21, 2006 21 Apr'06

    Study: SOX-compliant firms see drop in costs in year 2

    According to a new report, companies following Section 404 of the Sarbanes-Oxley Act will see a decline in compliance costs in their second year. However, experts say IT spending on SOX compliance in general will continue to grow.

  • April 21, 2006 21 Apr'06

    Research shows smarter phishing

    Recent threat reports all suggest a steady increase in the aggressiveness and sophistication of phishing attacks, and bank customers are still a top target.

  • April 19, 2006 19 Apr'06

    What the new Office means for developers

    Visual Studio Tools for Office lets developers customize Office documents and applications. Once Office 2007 comes out, the UI Ribbon can get a new look, too.

  • April 18, 2006 18 Apr'06

    Report: IM, P2P threats on the rise

    Research shows a steady increase in threats that target unauthorized IM and peer-to-peer applications. Worse yet, most IT departments have no way of knowing the threats exist.

  • April 18, 2006 18 Apr'06

    Law firm picks Palm Treos over BlackBerry 'pancakes'

    A Houston law firm wanted devices that could do it all but were also nice and compact. After rigorous testing, the firm chose Palm Treo smartphones over BlackBerrys.

  • March 30, 2006 30 Mar'06

    Special Report: How much is that SOA in the window?, part 1

    The confluence of two major movements in the software industry is promising to cause a change in how vendors make money on technology, and how customers spend money on technology.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchEnterpriseLinux

SearchDataCenter

SearchExchange

SearchContentManagement

Close