Echoing security warnings issued earlier this year, Adobe is warning users of Flash Player, Reader, and Acrobat to exercise caution online due to a zero-day vulnerability that's being actively exploited.
Virtualizing the Desktop
Hailed by top analysts as the future of enterprise computing, the benefits of desktop virtualization can be summed up in four words: Do more with less. This article delves into the options, outcomes, and business benefits. Download Now
FEATURED BLOG How CIO Szygenda Helped GM Get Out Of The Fortune-Telling Business Posted by Bob Evans As General Motors CIO Ralph Szygenda winds down his legendary career, he'll be remembered for many things: shifting the focus of his team from IT systems to cars and customers; consolidating a near-endless array of systems, applications, networks, and processes; using arbitrage to create a flexible network of third-party IT services; and more. But to me, the biggest impact he had was in helping make GM relevant again by changing it from a mediocre fortune-teller to a real-time global business.
ALSO SEE AT&T CEO Admits It Won't Have The iPhone Forever Posted By Eric Zeman
This week has seen the quarterly earnings reports from both Apple and AT&T -- partners in making and distributing the iPhone. The iPhone is clearly a hot seller, and AT&T knows the marriage can't (and won't) last forever.
How Google Could Stymie Apple Posted By Michael Hickins
Something few people could have foreseen is the impact that apps have on smartphone and feature phone sales; as the iPhone has demonstrated, apps really are the tail wagging the handheld dog.
Oracle Acquires GoldenGate To Bolster Data Integration Posted By Bob Evans
Oracle has added real-time data-integration capabilities with the acquisition of privately held GoldenGate Software, enhancing its ability to ensure that vital business applications aren't disrupted during migrations and upgrades. The announcement confirms reports that we wrote about five weeks ago here in Global CIO.
Latest Resources from the Database Security Tech Center:
- Why Your Databases Are Vulnerable To Attack
- Protect your Database. Here's how!
- How Dell Simplified Enterprise Security - Case Study
- 8 Steps to Holistic Database Security http://tinyurl.com/lxufhj