Netbook sales will likely grow by 50% in the next two years, according to research firm IDC, but the gadgets …
100 Gigabit Ethernet: Bridge to Terabit Ethernet
IT managers who are getting started with – or even pushing the limits of — 10 Gigabit Ethernet in their …
Palm’s webOS lives up to hype, developers say
Underneath the sleek exterior, the multi-touch display and the sliding keyboard of the upcoming Palm Pre smartphone is the real …
Microsoft patches ‘insane’ number of bugs
Microsoft released eight security updates that patch 23 vulnerabilities in Windows, Internet Explorer, Excel and other software in the company's …
Netbook computers spark corporate interest
One possible future of mobile computing is on display in classrooms in Fresno, Calif., where the public school district has …
Analysis: Where did Sun go wrong?
Just before the crash of the dot-com boom that spawned the meteoric rise of Sun Microsystems Inc., then-CEO Scott McNealy …
15 secrets of next-gen browsers
The browser market is heating up, with the major players poised to release new versions this spring, and Google having …
5 best router and switch features you never use
It's been said that Microsoft Word users only exploit 10% of the software's capabilities. The same might be true of …
Top 10 technology skills
Amid the worst job market in 25 years, IT is holding steady. Most CIOs are maintaining their current staffing levels; …
Polycom CEO sees videoconferencing on handhelds
NWME: Polycom has just had a record year of revenues. Why has videoconferencing come so far now when it was …
IETF to explore new routing technique
The IETF is forming a new working group to address scalability issues in the Internet's routing system caused by companies …
Google rolls out semantic search capabilities
Google has given its Web search engine an injection of semantic technology, as the search leader pushes into what many …
A search is launched for Conficker’s first victim
Where did the Conficker worm come from? Researchers at the University of Michigan are trying to find out, using a …
What it will take for mobile VoIP to get enterprise-ready
By all rights, mobile VoIP sounds like an enticing proposition for a lot of companies. After all, what enterprise wouldn't …
Researcher cracks Mac in 10 seconds at PWN2OWN, wins $5K
Charlie Miller, the security researcher who hacked a Mac in two minutes last year at CanSecWest's PWN2OWN contest, improved his …
Symantec launches cloud-based storage service for the masses
Symantec Corp. formally unveiled its cloud-based storage service, Norton Online Backup, marketing it as a consumer product for managing up …
Establishing End to End Trust
It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the …
Being Offline !
Although the Internet seems to be everywhere these days, there are still times when it's beyond your reach — on …
Mobile browsers bring new security headaches
The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. …
Security Implications of the Humble Computer Clock
Is the clock on every computer system in your organization set to the correct time? If your answer is no, …