News

News

  • September 28, 2006 28 Sep'06

    BlackBerry Pearl and other slick devices bring new challenges

    BlackBerry this week unveiled its Pearl, a slick handheld that makes older BlackBerrys appear clunky and antiquated. What can mobile managers expect as these hot new devices infiltrate the market and eventually the enterprise?

  • September 26, 2006 26 Sep'06

    Unsecured devices worry IT professionals

    IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.

  • September 14, 2006 14 Sep'06

    SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.

  • September 07, 2006 07 Sep'06

    Mobile workers push for smartphones

    Road warriors may prefer smartphones over laptops and PDAs, but equipping your entire mobile workforce with this nifty tool may not be such a great idea.

  • August 31, 2006 31 Aug'06

    Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.

  • Sponsored News

    • Why Choose the IBM Cloud for Your SAP Workloads

      Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More

    • How To Teach An Old Application New Tricks Via Cloud-Native Technologies

      Every enterprise has dozens, hundreds, or even thousands of applications developed through traditional methodologies. Whether those applications were created by internal developers or purchased off the shelf from software publishers, it’s highly likely they were built and deployed using tools and processes that have been around for years. See More

    • Leveraging The Cloud is Key To Strengthening SAP Disaster Recovery and Business Continuity

      Enterprise IT teams must do everything in their power to minimize downtime of business-critical SAP applications and ensure they can recover quickly, reliably and securely in the event of a disaster or other emergency. With enterprises fully embracing digital transformation, big data analytics, the Internet of Things and other innovations, they are more dependent than ever on the availability of their SAP environments. See More

    • Where to Start Your Cloud-Native Journey

      If you’ve committed your organization to cloud-native application development, you’re in good company. Research indicates organizations that take an aggressive pace in adopting cloud-native development are more likely than their less-ambitious peers to report higher revenues. As a result, more and more development efforts are now being envisioned and engineered to be cloud-native from the start, and many of those programs represent an organization’s first foray into the cloud-native development process. See More

    View All Sponsored News
  • August 25, 2006 25 Aug'06

    Symantec peddles enterprise vault tool

    The new Enterprise Vault software contains features developed because of a recent update to the Federal Rules of Civil Procedure.

  • August 22, 2006 22 Aug'06

    McAfee sued for patent infringement

    DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.

  • August 17, 2006 17 Aug'06

    Mobile Platforms: Palm OS -- not the best for the multitasker

    Mobile managers face a tough choice when weighing which mobile platform or operating system to deploy. We've assembled a team of experts and asked them to weigh the good and bad of each mobile platform to help you choose the one that's right for ...

  • August 17, 2006 17 Aug'06

    Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

  • August 17, 2006 17 Aug'06

    BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, ...

  • August 17, 2006 17 Aug'06

    Sun exec says Java ME release will push Java-Linux meld

    Sun's VP Rich Green talks about the pending software release from Sun that he thinks will result in more innovative applications on open source platforms.

  • August 17, 2006 17 Aug'06

    Antivirus researcher Gullotto leaves Symantec for Microsoft

    One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.

  • August 10, 2006 10 Aug'06

    Compliance software essentials: Build a technology toolbox

    There's really no one technology answer for regulatory compliance. Companies need a variety of tools to effectively meet the requirements of regulations such as Sarbanes-Oxley.

  • August 07, 2006 07 Aug'06

    Ajax threats worry researchers

    Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.

  • August 04, 2006 04 Aug'06

    Image-based spam scams on the rise

    By using images instead of text, spammers are invading your inbox with a lot more than offensive language. Not only are the emails vulgar and invasive, but they're also creating huge storage and bandwidth problems.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchDataCenter

SearchContentManagement

Close