Multiple press reports earlier on Friday reported that the overheating of the BlackBerry Bold was related to battery problems. However, …
SonicWALL adds Clean SSL VPN to UTM firewalls
SSL based Clean VPN integration delivers simplified and encrypted connectivity to remote network users while revolutionising protection by inspecting these …
Stimulus could revitalize muni Wi-Fi
Could $7.2 billion in federal funds committed to boost broadband in the U.S. transform small towns like Truckee, Calif., into …
More specialty Linuxes to the rescue
The day of the mold-your-own OS has come, and Linux is the clay. Linux provides free and open access to …
What does a real green data center look like?
Companies looking for a green data center model should take a look at the new facility Internap built in Somerville, …
Project management for networking geeks
Network professionals are typically well versed in the technical aspects of networking: router and switch configuration, server deployment and management, …
9 Dirty Tricks: Social Engineers’ Favorite Pick-Up Lines
What the average guy might call a con is known in the security world as social engineering. Social engineering is …
Conficker worm gets an evil twin
The new variant, dubbed Conficker B++, was spotted three days ago by SRI International researchers, who published details of the …
Develop a game plan for storage security
How much progress is really being made in securing storage? For several years now, pundits have sounded the alarm about …
Loving the cloud
Back in 1991, before the Internet was a big deal, Ohio State University technologist Jerry Martin signalled the nascent Internet's …
LG, Samsung develop solar-powered cell phones
LG and Samsung will both unveil next week cell phones that you definitively won't want to keep in your pocket. …
Looking inside the MPLS network
Visibility into the service providers' networks has always been a bit of a conundrum. The simpler the network, the less …
McAfee touts integrated compliance suite
McAfee has taken steps to integrate its vulnerability assessment and policy management products in a single suite to make it …
Don’t be a data loss victim
Somebody was siphoning customer financial data from a chain of gas station/convenience stores. The perpetrator covered his tracks so well …
The incredible shrinking operating system
From the software concept called JeOS (pronounced “juice”), the Just Enough OS, to hardware concepts like Celio RedFly, an 8-inch …
Mozilla to join EU suit against Microsoft
The European Commission has granted Mozilla, the open-source collaboration behind the Firefox Web browser, the right to join the antitrust …
NetApp discontinues SMB storage appliance
While NetApp will not provide any further product upgrades for StoreVault, which had recently been renamed the S Family/S550, NetApp …
NetApp discontinues SMB storage appliance
NetApp is killing off StoreVault, a network storage appliance designed for small and midsize businesses. While NetApp will not provide …
Project management for networking geeks
Network professionals are typically well-versed in the technical aspects of networking: router and switch configuration, server deployment and management, and …
Human error caused Google search bug
Human error caused a search results glitch that returned the message “this site may harm your computer” for about an …