The 3G networks of all four major U.S. wireless carriers deliver slower speeds than customers expect, according to Gartner Inc., …
Six desk security mistakes employees make every day
You've checked all of the entry ways in your office building, you have surveillance technology in place, and IT assures …
NetApp CEO: Virtualization driving sluggish storage market
“The market is not robust, but it's not dead either,” he said in an interview. The economic downturn has changed …
WhiteHouse.gov gets quick overhaul
While Barack Obama was being sworn in as president last week, his administration was unveiling a redesigned WhiteHouse.gov Web site …
WAN optimization in the year ahead
As 2009 kicked off, WAN optimization veterans think that this technology will be the biggest technology and industry trends to …
Brocade’s new CTO takes aim at Cisco
Just a few months ago, Dave Stevens began his second stint as CTO of Brocade. But this time, the company …
Downadup worm infects 1 in every 16 PCs, says Panda Security
The computer worm responsible for the biggest attack in years has infected at least one out of every 16 PCs …
Intel to shut four plants, lay off 6,000
Amidst a bevy of bad news in the PC market, Intel Corp. took two corrective steps this week, aggressively slashing …
Battle brewing over next-generation private clouds
Enterprises could make their datacenters more efficient by turning them into private computing clouds — but the biggest winners could …
Citrix plans ‘bare metal’ desktop hypervisor
Citrix Systems is working with Intel to develop a “bare metal” hypervisor for client PCs, which proponents say could broaden …
IBM introduces LotusLive
IBM has introduced LotusLive, which it describes as a portfolio of integrated Internet-hosted services for social networking and collaboration in …
Sun brings open source storage applices to the Middle East
Based on industry standard components and Sun's open source software, this new storage family offers Middle Eastern businesses breakthrough analytic …
Six worst Internet routing attacks
This list highlights the biggest security incidents involving the Internet's core routing protocol, the Border Gateway Protocol. Some of these …
Wikipedia gearing up
Wikipedia is gearing up for an explosion in digital content with new servers and storage designed to handle larger photo …
Network critical to business growth in ’09, Gartner says
The research firm Wednesday released the findings of a survey conducted between September and December 2008, which delivered some expected …
SanDisk, LG show MicroSD locked to carrier
SanDisk and LG Electronics on Wednesday demonstrated a specialized MicroSD card that mobile operators could load with content and bundle …
Cisco’s new 11n gear boosts legacy Wi-Fi performance with beamforming
Cisco unveiled a new 802.11n WLAN access point designed to simplify enterprise deployments, lower costs, and improve performance for existing …
EMC takes the gloves off with VMware
Five years after purchasing VMware, EMC is becoming more aggressive in selling its own products and services alongside those of …
Toshiba showcased its TransferJet prototypes
The first prototypes from Toshiba based on TransferJet, a short-range, high-speed wireless data transmission system intended as a replacement for …
Network vendors eye new markets in ’09
Microsoft aims to become a dominant player in hosted software and cloud computing in 2009, despite its late entry in …