March 2010
-
March 15, 2010
15
Mar'10
Mobile broadband spectrum auction may hit legal wall
The government's proposed auction of radio frequencies to enable the roll-out of mobile broadband may be delayed further by legal action. Continue Reading
-
March 15, 2010
15
Mar'10
iSoft "on track" for Lorenzo Morecambe Bay NPfIT milestone
iSoft deal with NPfIT supplier CSC "on track to be concluded in coming weeks."iSoft revises financial guidance for second-half because of currency fluctuationsiSoft told the Australian Securities ... Continue Reading
-
March 15, 2010
15
Mar'10
On Digital Archaeology
Digital Archaeology and rescuing aged computer computers. Continue Reading
-
March 15, 2010
15
Mar'10
Nintedno DS... DS Lite... DSi... DSi XL and now the 3DS?!?!?
Nintendo are well known for being innovative and reinventing themselves but to reinvent the Nintendo DS for the four times is going way too far... So thankfully we'll see a new handheld console ... Continue Reading
-
March 15, 2010
15
Mar'10
Jericho Forum launches free online security assessment tool
The Jericho Forum, a security think-tank founded by IT security professionals, has launched a free online tool for checking the effectiveness of IT security products. Continue Reading
-
March 15, 2010
15
Mar'10
Tiered storage strategies and best practices
Learn about available internal and external tiered storage models, data classification best practices for tiered storage, and some tiered backup and recovery strategies. Continue Reading
-
March 15, 2010
15
Mar'10
Choosing a data deduplication product for your data storage environment
We tell you the three questions you should answer before choosing a data deduplication product. Continue Reading
-
March 15, 2010
15
Mar'10
Open source software security tops commercial apps, study finds
New study results from Veracode Inc. show that open source software security tops the security offered in commercial applications. Continue Reading
-
March 15, 2010
15
Mar'10
Why you should incorporate server virtualisation into your disaster recovery plan
Adding server virtualisation to a disaster recovery plan lets virtual machines and data be restored to secondary site hardware that doesn't have to be a physical replica of your primary production environment. Continue Reading
-
March 15, 2010
15
Mar'10
Gartner's server virtualization security risk list
Gartner identifies six most common server virtualization security risks and provides advice on and how to combat them. Continue Reading
-
March 15, 2010
15
Mar'10
Disaster recovery, power and cooling secrets from Airtel data centers
How does one of the world's largest telecom companies manage disaster recovery, power and cooling at its data centers? By innovating, obviously! Continue Reading
-
March 15, 2010
15
Mar'10
Vulnerability management gets in-house treatment at AXA Business Services
To reduce cost pressures and ensure that its protection goals are met, the AXA Group company takes charge of its vulnerability management requirements. Continue Reading
-
March 15, 2010
15
Mar'10
How SMEs can use social networking to get their message across
In today's business environment, the ability to be available online for your users 24/7 is increasingly seen as a given. As a result, companies of all sizes... Continue Reading
-
March 15, 2010
15
Mar'10
Moving beyond the cost benefits of outsourcing
When thinking about IT outsourcing ,... Continue Reading
-
March 15, 2010
15
Mar'10
How can organisations guard against phishing scams?
What should information security professionals be doing to ensure their organisations are protected from phishing scams aimed at private enterprise? John... Continue Reading
-
March 15, 2010
15
Mar'10
Nortel reverses losses
The fire-sale of Nortel's business units last year has accomplished what the supplier's management team failed to do, reversing its full-year net losses. During... Continue Reading
-
March 15, 2010
15
Mar'10
How Procter & Gamble adopted ITIL to ease IT infrastructure outsourcing, multisourcing
The Procter & Gamble Company has conducted several rounds of outsourcing and attributes the contracts' sucess to the aplpication of ITIL. Continue Reading
-
March 13, 2010
13
Mar'10
Brown, Cameron and Clegg agree on importance of broadband but blogocracy disagrees
Meanwhile the organiser of the E-Business Regulatory Alliance said on Linked In that he could not understand why we needed 100 mbps pipes. It was as if his counterpart at the Steam Business ... Continue Reading
-
March 12, 2010
12
Mar'10
Who needs dense 10 GbE switches?
Ethernet vendors are plugging port density as the new must-have. But even if you are virtualizing heavily do you really need a switch with so much power? Continue Reading
-
March 12, 2010
12
Mar'10
Council criticises IT security of Summary Care Records
A local authority has formally raised concerns about the lack of IT security of the Summary Care Records scheme, which is part of the £12.7bn NHS National Programme for IT (NPfIT). Continue Reading