News

Business applications

  • May 29, 2007 29 May'07

    SAN School: Table of contents

    What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School.

  • May 25, 2007 25 May'07

    VoIP advice from the trenches

    ITKE, or ITKnowledge Exchange, is simply a cool (and quick) way to get a response to your VoIP-related questions.

  • May 24, 2007 24 May'07

    Microsoft fixes Office 2007 patch issues, releases MOICE

    The Microsoft Security Response Center acknowledged that some of the company's May 8 security updates didn't make it to machines running Office 2007 on Windows Vista.

  • May 24, 2007 24 May'07

    Symantec, Huawei form joint storage, security company

    Symantec has formed a joint venture with storage and networking hardware company Huawei and indicated jointly developed products are coming to the US

  • May 24, 2007 24 May'07

    IETF approves new weapon to fight spam, phish

    DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.

  • May 24, 2007 24 May'07

    Microsoft investigates new Office zero-day flaw

    Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned.

  • May 21, 2007 21 May'07

    Mobile instant messaging enhances company's business processes

    A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes.

  • May 17, 2007 17 May'07

    VoIP security fundamentals

    VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...

  • May 16, 2007 16 May'07

    When signature based antivirus isn't enough

    Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.