News

News

  • August 03, 2006 03 Aug'06

    Image spam paints a troubling picture

    Vendors say as many as one in four spam messages are now image-based, as attackers more commonly use hard-to-detect .jpg and .gif image files to bypass spam filters.

  • August 03, 2006 03 Aug'06

    Symantec: Searching for a strategy?

    After phasing out some appliances and watching EMC reel in RSA, some say Symantec is strategically adrift. To correct its course, experts say it must satisfy the demand for better product integration.

  • August 03, 2006 03 Aug'06

    McAfee products vulnerable to code execution flaw

    VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw.

  • July 20, 2006 20 Jul'06

    BlackBerry hosted server feeds SMB mobile email hunger

    BlackBerry maker RIM announced a hosted mobile email server, but some experts are wondering whether it makes sense to have hosted mobile email with an on-site email server.

  • July 17, 2006 17 Jul'06

    Symantec says enterprises failing to secure instant messaging

    Results of a recent Symantec survey suggest that nearly three out of every five organizations have not secured their instant messaging applications.

  • Sponsored News

    • Why Choose the IBM Cloud for Your SAP Workloads

      Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More

    • How To Teach An Old Application New Tricks Via Cloud-Native Technologies

      Every enterprise has dozens, hundreds, or even thousands of applications developed through traditional methodologies. Whether those applications were created by internal developers or purchased off the shelf from software publishers, it’s highly likely they were built and deployed using tools and processes that have been around for years. See More

    • Leveraging The Cloud is Key To Strengthening SAP Disaster Recovery and Business Continuity

      Enterprise IT teams must do everything in their power to minimize downtime of business-critical SAP applications and ensure they can recover quickly, reliably and securely in the event of a disaster or other emergency. With enterprises fully embracing digital transformation, big data analytics, the Internet of Things and other innovations, they are more dependent than ever on the availability of their SAP environments. See More

    • Where to Start Your Cloud-Native Journey

      If you’ve committed your organization to cloud-native application development, you’re in good company. Research indicates organizations that take an aggressive pace in adopting cloud-native development are more likely than their less-ambitious peers to report higher revenues. As a result, more and more development efforts are now being envisioned and engineered to be cloud-native from the start, and many of those programs represent an organization’s first foray into the cloud-native development process. See More

    View All Sponsored News
  • July 13, 2006 13 Jul'06

    New chapter and verse on Ajax security

    The increased use of Ajax has brought to the forefront concern about its security. Recognizing that this is an issue, the Open Web Application Security Project (OWASP) is updating its Guide to Building Secure Web Applications to include a separate ...

  • June 29, 2006 29 Jun'06

    Lotus Domino email archiving strategies and practices

    Notes/Domino expert Kevin Marshall teaches a step-by-step plan and strategy for implementing an email archiving and message retention system for a Notes/Domino environment.

  • June 29, 2006 29 Jun'06

    School district hooks up affordable compliance archive

    A Texas school district connected its email system to archiving software and DVD jukeboxes, avoiding a cost and management hassle.

  • June 22, 2006 22 Jun'06

    SMS vs. mobile email: Which is the 'killer app'?

    SMS -- yes, what your kids call text messaging -- is widely used in the enterprise. But can SMS surpass mobile email?

  • June 14, 2006 14 Jun'06

    JavaScript worm spreads through Yahoo Mail

    JS.Yamanner manages to propagate when end-users view a malicious email. A fix is pending, but other Web applications using JavaScript may soon be affected.

  • June 08, 2006 08 Jun'06

    How your Lotus Domino server can get blacklisted

    Learn about the different ways that your Lotus Domino server can get blacklisted.

  • June 08, 2006 08 Jun'06

    Who, or what, is reading your email?

    According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email.

  • June 08, 2006 08 Jun'06

    Related links on Lotus Domino server spam prevention

    Here's a collection of resources to learn more about spam prevention for your Lotus Domino server.

  • June 08, 2006 08 Jun'06

    How to remove your Lotus Domino server from spam blacklists

    Learn about the measure you can take to get your Lotus Domino server removed from spam blacklists.

  • June 01, 2006 01 Jun'06

    Mainsoft enables .NET applications to run on WebSphere Portal

    Mainsoft has released a new version of Visual MainWin for J2EE, which allows .NET applications to be transferred into Java bytecode that can then be deployed on WebSphere Portal.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchDataCenter

SearchContentManagement

Close