July 2009
-
July 15, 2009
15
Jul'09
The Apollo 11 mission's computers were less powerful than today's mobile phones
The Apollo 11 mission's computers were less powerful than today's mobile phones Continue Reading
-
July 15, 2009
15
Jul'09
Critical security hole hits Firefox 3.5
Mozilla is working on a fix for a "highly critical" vulnerability in is Firefox browser. Continue Reading
-
July 15, 2009
15
Jul'09
Hacker leads Apple on iPhone software compatibility
The iPhone Dev Team has released an application to crack the iPhone and make software compatible with the device even if it is not available on Apple's App...
Continue Reading
-
July 15, 2009
15
Jul'09
How to be a Superbrand
I was interested to read that Microsoft has overtaken Google to top the latest UK consumer survey of leading brands. The three criteria used were quality, reliability and distinction. These are not ... Continue Reading
-
July 15, 2009
15
Jul'09
Sun Microsystems warns of 30% revenue decline
Sun Microsystems has warned that revenues for what should be its final quarter before the Oracle acquisition is finalised are likely to be down 30% on last year's figures. Continue Reading
-
July 15, 2009
15
Jul'09
Get TV on your phone - fixed or mobile - anywhere
Rural subscribers may soon have access to high-definition TV and broadband internet access via fixed and mobile connections following the launch of a... Continue Reading
-
July 15, 2009
15
Jul'09
Dell cloud services could cut SMEs' IT costs by 30%
Dell UK has launched three cloud-based services that it says could help small and medium enterprises cut their IT costs by 30%.
Dell...
Continue Reading -
July 15, 2009
15
Jul'09
How does search engine malware spread?
Expert Richard Brain explains how malware can take advantage of Web crawlers and spread malicious code to a number of vulnerable websites. Continue Reading
-
July 15, 2009
15
Jul'09
When to use a unified threat management system
Network security expert Peter Wood explains why a unified threat management product may be only one of many tools that an organization should use to fight off malware threats. Continue Reading
-
July 15, 2009
15
Jul'09
The essentials of a smartphone, mobile security policy
Smartphones are often far too useful to be completely restricted from the enterprise. The risks from mobile devices, however, call for a number of important security features. Michael Cobb reviews how to lock down an organization's many smartphones. Continue Reading
-
July 15, 2009
15
Jul'09
How do you defragment NAS?
-
July 15, 2009
15
Jul'09
UK data storage management case studies
Keep up-to-date with our latest UK case studies on data storage management, data backup and recovery, storage infrastructure management and more. Continue Reading
-
July 15, 2009
15
Jul'09
Containerised data centre - MoD demo latest in military information technology
-
July 15, 2009
15
Jul'09
EADS Ectocrypt products - MoD demo latest in military information technology
-
July 15, 2009
15
Jul'09
EDS agile - MoD demo latest in military information technology
-
July 15, 2009
15
Jul'09
Rapier ground to air missile system
-
July 15, 2009
15
Jul'09
Team Sparta - MoD demo latest in military information technology
-
July 15, 2009
15
Jul'09
Helmand task force - MoD demo latest in military information technology
-
July 15, 2009
15
Jul'09
Tents - MoD demo latest in military information technology
-
July 15, 2009
15
Jul'09
Aurora radio spectrum management system - MoD demo latest in military information technology