• October 30, 2006 30 Oct'06

    Essential practices for securing mobile devices

    In this lesson, Lisa Phifer examines inherent weaknesses in mobile messaging devices, and discusses how to lock down mobile platforms to protect against emerging threats and risky end-user behaviors and how to ensure Bluetooth-enabled handsets ...  Continue Reading

  • October 30, 2006 30 Oct'06

    Esure has Wily way to handle screen scraping

    Online insurance company esure has employed a Wily web performance management tool from Computer Associates to ensure its website availability remained close to 100% throughout its summer sale, despite peaks in CPU demand created by an online ...  Continue Reading

  • October 30, 2006 30 Oct'06

    QE2 Centre finds the time for VoIP

    The Queen Elizabeth II Conference Centre has implemented a voice over IP and wireless hotspot service, after taking three years to settle on a timeslot to carry out the upgrade.  Continue Reading

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close