Time for a Switch
Speeds and feeds as an Ethernet differentiator are over. Ethernet macho will be based much more on offering adaptable consumption models than raw throughput.
Speeds and feeds as an Ethernet differentiator are over. Ethernet macho will be based much more on offering adaptable consumption models than raw throughput.
BlackBerry may run the Android operating system on a slider smartphone coming this fall, according to unnamed sources in a <a href="http://www.reuters.com/article/2015/06/11/us-blackberry-google-android-idUSKBN0OR2ZM20150611">Reuters</a> report.
Facing life in prison, Ross Ulbricht is appealing his seven convictions for operating Silk Road, the illegal drugs online marketplace.
A Massachusetts police department paid $500 to free up town files that had been encrypted by CryptoLocker, the ransomware that locks down hard drives until the owners pay up.
Microsoft has seeded Windows 7 and Windows 8.1 PCs with an as-yet-optional update that will pitch the free Windows 10 upgrade to customers.
Not every organization has moved its IT operations to the cloud, nor should we expect that to be the case. There are legitimate reasons to adhere to the on-premises IT approach, not the least of which is the fact that it assures that your IT infrastructure and all the data in it is under your control.
For all the emphasis on tools and gizmos, IT is still very much about the people who develop and use said tools and gizmos. Collaboration, mutual respect, passion for the work -- all this and more are essential to a beneficial outcome, whether your IT group is shipping code, swatting bugs, working with business users, or securing company systems.
Federal IT projects have hit the critical care list all too often and now watchdogs at the Government Accountability Office have moved those undertakings to its <a href="http://www.gao.gov/products/GAO-15-290">High Risk List</a> which means Congress and the executive branch should take an extra special look at the situation.
Cisco today filed two lawsuits against data center switch competitor Arista Networks for allegedly violating its intellectual property.
BlackBerry's pitch to get back into the warm embrace of corporate IT shops seems logical enough at first glance: We're the most secure in mobile. Mobile is where all of your data and interactions are heading. Therefore you should give us all of your corporate business.
Regin, a complex and stealthy piece of espionage malware, steals passwords, logs keystrokes and can read, write, move and copy files, among other malicious activity, and has stunned the Symantec researchers that detailed it in a report.
The Merchant Customer Exchange (MCX), a consortium of 58 major U.S. retailers whose mobile payment network will take on the new Apple Pay early in 2015, today held a hastily-organized news conference to address questions about a hack that pilfered consumer email addresses.
As I moved into the information security position at my new company a few weeks ago, I was anxious to do a full assessment of our security defenses. But I was immediately sidetracked by, not one, but two major vulnerabilities that couldn't be ignored. Those were fires that had to be put out before I could do anything else.
Is the dawn of the age of ubiquitous e-payments finally here? Can we throw away our credit cards yet?
Cisco says small cell technology is primed for explosive growth as it plans to connect 3G and LTE cellular networks to Wi-Fi access points that are already widely deployed in many enterprise facilities.