Profile of Larry Greenemeier
News & Commentary Posts: 1064
Articles by Larry Greenemeier
posted in September 2005
Red Hat and partners plan an operating system specialized for user security levels.
It's not an easy proposition, given the vendor's ballooning portfolio of products.
Red Hat, with help from IBM and Trusted Computing Solutions, plans to put its operating system through the paces of the National Information Assurance Partnership's Common Criteria evaluation program to create the first "trusted" Linux operating system.
The newest offerings are part of Cisco's Self-Defending Network security strategy, launched a few years ago to deliver real-time response to threats based on internal and external network intelligence.
The United States has traditionally seen the seas as an open highway for commerce and immigration. Of course, these waterways are also used to smuggle contraband and, more recently, have the potential to become an avenue for a terrorist attack. The shadowy nature of terrorism turns conventional national defense strategies on their ear.
Vendor will have to overcome big rivals and ill will from its legal history.
A little over a month ago, I set out to find out just how popular open-source software has become within big business. These are companies that have the money to spend on the biggest, most complex packages that IBM, Oracle, and other enterprise software makers have to offer. They're also companies with armies of IT professionals highly proficient in writing and maintaining their own applications. Why in the world would they use open source? Actually, the question has become: why in the world
SCO launches a set of Web services designed to let companies tie "smart" handheld devices that act both as cell phones and mobile desktops to back-end applications and data.
At the core of the technology is an IBM-developed tamper-resistant embedded controller that runs the Linux operating system and acts as an intelligent, real-time tracking device.
NetIQ introduces templates for its Security Compliance software suite to help government agencies tackle access control, audit and accountability, configuration management, and identification and authentication.
Satyam Computer Services wants to take more international business contracts away from leading IT services firms such as Accenture, CSC, EDS, and IBM Global Services.
Nearly four years after the Sept. 11 terrorist attacks, the Homeland Security Department is still coming to grips with the massive mission it's been handed. While the department this week has contributed resources to aid the victims of Hurricane Katrina, it also must be ever vigilant in focusing on its primary goal of preventing terrorist attacks in the U.S. One of Homeland Security's most challenged agencies has been the Transportation Security Administration, which early on was saddled with ou