Just Say No to Virtual Security FUD
What is special about a virtual computer-a VM? It's a computer in a file. That's it. It's just a computer stored in a file with similar foibles and management issues as a physical computer. So why do some people invest virtual computers some magical transformative powers? Do they not understand what a virtual computer is?
bMighty bSecure: SMB Security On A Budget - And On Demand!
When times get tough, it's all too tempting to push security concerns aside. But that's a fool's game. Fortunately, there are ways for small and midsize companies to address security issues without breaking the bank. To learn more, check out the On-Demand version of bMighty bSecure, which brings together business and security experts to show you how to do exactly that.
Google Granted Floating Data Center Patent
Google is considering floating data centers because of the practical problems it faces in trying to locate data centers on coastal land, where real estate is typically expensive.
Feds Ink Deals To Let Government Agencies Use Social Media
The General Services Administration reached agreements with popular social media networks like Facebook and YouTube to allow agencies to use the service. Previously, elements of the terms of these services blocked the government from using them.
5 Tips For Avoiding Litigation In A Recession
With cash tight the last thing your business needs right now is a lawsuit. But the inevitable collection difficulties that come with a recession increase the likelihood of a business dispute. Here's 5 tips to help your business steer clear of litigation and handle it effectively if it does happen to you.
Going On A Job Interview? Here's Some Help
Job interviews rank up there with root canal for most people. Wouldn't you want to know in advance the trickiest question your prospective employer might ask on your job interview?
IT Helps Seal Our Borders
The economic stimulus package includes about $980 million aimed at beefing up surveillance of our borders. Much of that fuels a huge bet that technology projects can help secure them.
Nokia's App Store Will Require Credit Cards
The company couldn't get carrier billing in the United States but thinks the social networking and location-based aspects of its Ovi Store will help it gain widespread adoption.
Microsoft: We're Not Making A Phone
The company denies recent reports that it's working on a "ZunePhone" for Verizon Wireless, and it will focus on upcoming Windows Mobile upgrades.
Inside Ubuntu 9.04
Critics are calling 'Jaunty Jackalope' as slick and seamless as Mac OS X. We uncover the Linux distro's pitfalls and gotchas -- as well as its hidden delights.
New ProCurve Threat Module: Flexibility Requires Planning
HP ProCurve announced a new module for their ProCurve 8212 and 5400 modular switches. The Threat Management Module offers firewall, VPN, and IPS functions simultaneously on the switch backplane which is unlike Cisco's approach with the Catalyst 6500 requiring separate security modules firewall, VPN, and IPS. The cost, however, is lower performance per module. ProCurve needs to increase module performance to make it a replacement for appliances.
You Can't Have Your Java And Fork It, Too
The other night I commiserated with a friend over Sun's sale to Oracle, with both of us agreeing gloomily that this most likely means the end of Java as we know it. Actually, it may mean a whole new beginning for Java -- or a whole bunch of new beginnings -- and that's exactly the problem.
Mobile Apps To Hit $25 Billion By 2014
Handset makers will receive the bulk of the revenue selling apps to smartphones, but carriers have an opportunity to bring app stores to entry-level and feature phones.