To do this, they've exploited a bug in the digital certificates used by Web sites to prove that they are …
Avaya spells out top IT trends for 2009
After an impressive 2008 which saw larger enterprises planning five years ahead by investing in converged voice and data networks, …
Thriving on chaos
The mood was anything but geeky at HP Software Universe 2008 in Vienna. From December 9th to 11th, the bottom …
Managed Security Services – Bane or Boon?
The supporters vehemently profess that Managed Security Services should be considered as a kind of panacea for today’s burgeoning security …
eHDF’s Muthabara initiaitve
As part of the 11-week Muthabara programme launched earlier this year, officials from eHosting DataFort met with authorities in Government …
Brocade completes Foundry acquisition
The addition of Foundry’s products and technologies enables Brocade to better address the needs of its customers and strengthens the …
Digital hospital
Requirements for high-performing, secure network systems are on a steady rise and quality, as well as cost-efficiency, must be ensured. …
Securing the Web
What’s the significance of the web security appliances for the government sectors, investment companies and banks in the UAE? And …
Microsoft confirms it’s been working on SQL bug since April
On Monday, the company warned customers of a bug that could be used to compromise servers running older versions of …
Comstor releases fifth global edition of Cisco Solutions Handbook
This year, the handbook is being offered both as an online eBook as well as a standalone printed version to …
Internet needs global regulation, says researcher
According to Mary Landesman of ScanSafe, the recent Federal Trade Commission (FTC) injunctions against two companies accused of distributing fake …
Three deals symbolized storage trends in 2008
Overall demand for storage capacity is growing by about 60 percent per year, according to IDC. Another research company, Enterprise …
10 tips to preserve data for the long haul
The growth of digital data is threatening to spiral out of control. More than 452 exabytes of information have been …
Virtualisation risks
Does transitioning to virtualization increase security risks within a company? IT managers appear to be at loggerheads with IT security …
Microsoft’s 2009 to-do list
It has been a year of transition for Microsoft in 2008, with the biggest being co-founder and company icon Bill …
Symantec teams up with VMware
The initiative between the two software vendors includes: cooperative support through the Technical Support Alliance Network (TSANet) for mutual customers …
Turbocharging apps
The Landmark Group is one of the largest retailers in the region with over 750 stores in the GCC countries, …
Cisco introduces “medianet” technologies and solutions
This new class of technologies is designed to enable advanced communications, collaboration and entertainment experiences through video- and rich media-optimized …
New thumbtack from Microsoft
Microsoft's Live Labs on Wednesday introduced a new service that lets users collect snippets of information from Web sites and …
Nortel’s unified communication approach
Nortel has unveiled a new educational program designed to provide IT professionals and students with a broader understanding of unified …