Tech data: News in brief

Nokia has delayed shipping its Linux-driven Internet Tablet PC because of software problems. The 770 Internet Tablet was due to be launched last month, but Nokia has confirmed it is being withheld to iron out software bugs in the system. The device is now expected later this year. The Internet Tablet is designed to allow users to access the web and e-mail while on the move.

Nokia delays 770 Tablet to iron out bugs

Nokia has delayed shipping its Linux-driven Internet Tablet PC because of software problems. The 770 Internet Tablet was due to be launched last month, but Nokia has confirmed it is being withheld to iron out software bugs in the system. The device is now expected later this year. The Internet Tablet is designed to allow users to access the web and e-mail while on the move.

Print server to support 64-bit environment

Print management software supplier ThinPrint has developed a print server environment for 64-bit Windows. The Remote Desktop Suite Premium 64-bit is designed to provide remote access, up to 70% more users per server, 80% less network load during printing, and direct support for 32-bit printer drivers, the company said. The product includes Microsoft Terminal Service licences for turning a Windows 2003 server into a complete 64-bit server-based computing environment.

QLogic HBAs certified by EMC as E-Lab Tested

The Sanblade 4Gbytes Fibre Channel host bus adapter (HBA) from QLogic has been certified by storage supplier EMC as E-Lab Tested. The certification means QLogic HBAs can be used to connect EMC Clariion networked storage systems to servers with high-performance PCI-X 2.0 and PCI-Express slots, to support business continuity. Both single and dual-port versions of Sanblade 4Gbyte HBAs have been certified.

Deviceshield developed to stop theft via mobiles

IT auditing and helpdesk software supplier Layton Technology has developed a product to help prevent people stealing corporate data via mobile devices. Deviceshield controls who is authorised to connect which devices to their PCs, and therefore the corporate network, and which files can be downloaded to or uploaded from portable storage devices. Alerts are generated in the event of an unauthorised device being used.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close