Seventh annual IBM 5-in-5 releasedJanuary 1, 2013
In mid-December, IBM Corp. unveiled the seventh annual “IBM 5 in 5” — a list of innovations that have the potential to change the way people work, live and interact during the next five years.
Employee-empowering technologies raise security stakes for organizations: CompTIANovember 14, 2012
Cloud computing, mobility, social tools and other technologies that put more power in the hands of individual users pose new challenges for organizations seeking to secure data, devices and networks, new research released this week by CompTIA,…
Cisco and Citrix extend desktop virtualization pactOctober 17, 2012
Cisco Systems Inc. and Citrix Systems Inc. today announced an expansion of their desktop virtualization partnership into three strategic areas: cloud networking, cloud orchestration, and mobile workstyles.
ITU Telecom World 2012 to take place in DubaiOctober 11, 2012
Major figures from the ICT industry will present their vision and strategic thought leadership at ITU Telecom World 2012, ITU’s global networking and knowledge-sharing event, taking place in Dubai next week.
Popular Web sites in Canada disclosing personal information, says Privacy CommissionerSeptember 26, 2012
Some leading Web sites in Canada are inappropriately “leaking” registered users’ personal information — including names, e-mail addresses and postal codes – to third-party sites such as advertising companies, research by the Office of the…
McAfee Threats Report reveals largest malware rise in four yearsSeptember 6, 2012
McAfee this week released the McAfee Threats Report: Second Quarter 2012, which found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5 million increase in malware since Q1 2012 and identified…
A people propositionSeptember 1, 2012
There are some unique fundamentals that come into play when the healthcare sector engages in network planning. Conversations around future proofing, security and redundancy all have a special meaning in a sector that increasingly relies on…
Rogers, SAP join forcesJuly 25, 2012
Rogers Communications and SAP AG have announced plans to develop and manage the deployment of new enterprise mobile applications, which leverage the SAP mobile platform.
Ekahau launches anti-theft Wi-Fi tag for laptops and tabletsJuly 12, 2012
Ekahau Inc., a developer of Wi-Fi-based Real Time Location Systems (RTLS), has launched the L4 Laptop tag, a small flat unit designed to be plugged into the ExpressCard slot. The tag works with the Ekahau RTLS system, which can track and manage…
Check Point DDOS Protector appliances fight DDoS attacksJuly 5, 2012
Check Point Software Technologies Ltd. this week introduced a new line of security appliances designed to fight Distributed Denial of Service (DDoS) attacks.