The vulnerability that sent Microsoft scrambling and is being used by hackers now to attack Internet Explorer (IE) users may …

The vulnerability that sent Microsoft scrambling and is being used by hackers now to attack Internet Explorer (IE) users may …
For the second time in six weeks, Microsoft confirmed that hackers are exploiting an unpatched bug in DirectX, this time …
Bing has beaten Google to the punch. Google Inc. has been rumored to be casting an eye toward creating a …
IBM is bundling its x86 servers with VMware's newest virtualization platform, and offering financing packages to lower upfront costs. The …
Cisco Systems Inc. will be making aspects of its IP voice technology available virtually and selling them as a service …
Responding to strong customer and market demand to recognize the architectural expertise of network designers, Cisco today introduced the Cisco …
The ICT sector in the region, particularly in the UAE, has demonstrated resilience to weather the current economic storm thanks …
Intel and handset maker Nokia are teaming to develop new mobile computing device and chipset architectures, the companies said. The …
First-quarter global PC shipments fell 8.1% year-over-year, according to market researcher iSuppli , dragged down by weaker-than-expected desktop PC shipments. …
Red Hat announced that the Red Hat Enterprise Virtualization portfolio of products has transitioned to Beta and is on track …
Red Hat announced that the Red Hat Enterprise Virtualization portfolio of products has transitioned to Beta and is on track …
The search business has quickly become a hotbed of activity among a variety of companies in recent weeks. The new …
It is a tough market out there and perhaps tougher if you are a new entrant. It helps of course …
Worldwide PC shipments fell 6.8% in the first quarter of 2009 (1Q09), about 1.4% better than expected but still the …
McAfee today outlined details of its network security strategy, which integrates McAfee’s complete network security suite, including network firewalls, intrusion …
In most verticals, the market is evolving into a more matured phase of utilising converged IT infrastructure as a business …
Underlining its new worldwide focus, Fujitsu now introduces a standardized global storage portfolio, aimed at providing its growing customer base …
The definition of cloud computing can be nebulous. Some call it utility computing, some refer to it as software-as-a-service, still …
Emirates Computers showcased its state-of-the-art EMC Velocity2 Signature Solution Center in the recently held IDC’s ‘Virtualisation & Next Generation Data …
UTM systems have multiple features and capabilities, including intrusion detection and prevention, gateway antivirus, e-mail spam filtering and Web content …