Business applications
At the heart of enterprise software strategy are the key business applications upon which every organisation relies. From enterprise resource planning (ERP) to customer relationship management (CRM), financial and accounts software to business intelligence (BI), such applications demand high investments and can deliver high returns. We analyse the latest product developments and the news from major suppliers such as Oracle, Microsoft and SAP.
- 
				Opinion
					31 Oct 2025
					
									
										  Why asset visibility matters in industrial cybersecurityIndustrial organisations face rising operational security cyber threats. Asset visibility is vital for defence — without knowing what’s connected, organisations are risk blind Continue Reading 
- 
				News
					31 Oct 2025
					
									
										  Capgemini and Siemens combine to make AI industrial techSiemens and Capgemini are expanding their partnership to create AI-based industrial technologies, said to boost efficiency, sustainability and innovation in manufacturing sectors Continue Reading By- Brian McKenna, Enterprise Applications Editor
 
- 
                News
                07 May 2007
                  Is RAID in general an obsolete technology today?This is a technology that is so commonly used, so transparent, that we really don't even think about it... Continue Reading 
- 
                Feature
                07 May 2007
                  The trouble with Google hacking techniquesSome IT security professionals say the threat posed by Google hacking techniques is overblown and that companies can easily avoid it with a layered security program. One skeptical expert is Ira Winkler, founder of the Internet Security Advisors Group (ISAG) and author of such books as "Spies Among Us." In this Q&A, he talks about how Google hacking is not new and why he thinks IT pros who aren't aware of it should go back to security school. Continue Reading By
- 
                News
                03 May 2007
                  Quiz: Enterprise strategies for protecting data at restA five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading 
- 
                News
                03 May 2007
                  Quiz: Demystifying data encryptionA five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading 
- 
                News
                03 May 2007
                  Microsoft users sticking with third-party security vendorsIT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors. Continue Reading By
- 
                News
                02 May 2007
                  Microsoft to release DNS patch TuesdayIn addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk. Continue Reading By
- 
                News
                26 Apr 2007
                  New image spam sneaks into inboxesResearchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                News
                24 Apr 2007
                  Scaling storage networks demands careful considerationIn the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to pass storage data between storage devices. This requires the use of IP switches and routers, and can involve the deployment of iSCSI TOE host adapters to offload iSCSI traffic from the local server's CPU. This Buying Guide is intended to help clarify the principle considerations involved scaling storage networks and each chapter offers a set of buying points and product specifications that can help readers identify prospective new scaling products. Continue Reading 
- 
                Feature
                24 Apr 2007
                  Storage consolidation: WAN acceleration and WAFS technology overviewOne important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading 
- 
                Feature
                24 Apr 2007
                  Storage consolidation: SRM tools overviewSRM tools are an important part of storage consolidation. They allow admins to monitor the storage environment, allocate and organise available storage, and offer insights into future trends. Continue Reading 
- 
                Feature
                24 Apr 2007
                  IP storage switch and router specificationsKey specifications for a cross section of popular IP storage switch and router products. Continue Reading 
- 
                Feature
                24 Apr 2007
                  IP storage switch and router purchase considerationsThe choice of an IP switch or router demands careful consideration of issues including port speed, segmentation, interoperability and security Continue Reading 
- 
                News
                24 Apr 2007
                  Apple fixes 25 Mac OS X flawsAttackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                23 Apr 2007
                  Weekly compilation of storage news:Dell LTO-4 drive, new Sun arrayDell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor. Continue Reading By- SearchStorage.com Staff
 
- 
                News
                17 Apr 2007
                  Storage consolidation: Disks and disk subsystems overviewAny storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain Continue Reading 
- 
                News
                16 Apr 2007
                  Storage consolidation: Weighing the pros and consStorage consolidation holds out the promise of more efficient storage management. But pitfalls include slower network performance and a difficult data migration process. Continue Reading 
- 
                News
                16 Apr 2007
                  EMC, Symantec to enter Software as a Service marketEMC has plans to release Software as a Service (SaaS) products for data backup and archiving; Symantec announces a new online backup service. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                Feature
                16 Apr 2007
                  Inside MSRC: Windows Vista security update explainedMicrosoft's Christopher Budd details the first Windows Vista security updates. Continue Reading By- Christopher Budd, security program manager for the Microsoft Security Response Center (MSRC)
 
- 
                News
                15 Apr 2007
                  Malware outbreak 'largest in almost a year'Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year. Continue Reading By
- 
                News
                12 Apr 2007
                  Microsoft investigates DNS server flawAttackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                12 Apr 2007
                  Microsoft DNS server flaw called dangerousUPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                News
                11 Apr 2007
                  Instant messaging threats become more sophisticatedInstant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers. Continue Reading By- Kate Dostart, Associate Editor
 
- 
                News
                11 Apr 2007
                  Architectural firm swaps online data backup service providersAs online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                10 Apr 2007
                  Capacity planning software specificationsGauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources. Continue Reading 
- 
                News
                08 Apr 2007
                  How data deduplication eases storage requirementsStorage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as data deduplication. This article explains the basic principles of data deduplication, and looks at implementation issues. Continue Reading 
- 
                News
                08 Apr 2007
                  Spam campaign uses Storm-like attack techniqueSpammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines. Continue Reading By
- 
                News
                08 Apr 2007
                  Symantec fixes 'high-risk' flaw in Enterprise Security ManagerAttackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with. Continue Reading By
- 
                News
                04 Apr 2007
                  Data security breach at UCSF may have exposed thousandsThe University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud. Continue Reading By
- 
                Feature
                04 Apr 2007
                  When disaster recovery and data classification collideAttendees at a disaster recovery seminar discussed the complex application dependencies when disaster recovery and data classification combine. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                01 Apr 2007
                  Spam poses as Internet Explorer 7 downloadBeware of emails from "[email protected]." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware. Continue Reading By
- 
                News
                01 Apr 2007
                  Microsoft releases patch for Windows ANI flawSecurity companies are seeing massive attacks against the Windows ANI zero-day flaw, prompting Microsoft to rush out a fix a week before Patch Tuesday. Continue Reading By
- 
                Feature
                29 Mar 2007
                  Will data breach be the end of TJX?This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading By- Senior News Writer Bill Brenner
 
- 
                News
                27 Mar 2007
                  Compellent adds boot from SAN consolidationUpdate saves storage space by consolidating boot volumes into a "golden" copy of the OS, but experts are troubled by a lack of partnerships with server and OS vendors. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                Feature
                27 Mar 2007
                  IT pros eye Windows Server 2003 SP2 with cautionDespite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading By
- 
                News
                26 Mar 2007
                  What are some of the other options available to help manage unstructured data?Eliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data entirely... Continue Reading 
- 
                News
                26 Mar 2007
                  What are some of the best practices for managing the growth of unstructured data?It starts with corporate policies around data management... Continue Reading 
- 
                News
                26 Mar 2007
                  What is unstructured data and how is it different from structured data in the enterprise?What we're really doing is designating our data as structured or unstructured. Let's start with structured data... Continue Reading 
- 
                News
                26 Mar 2007
                  Web 2.0: CIOs want it their wayA new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors. Continue Reading By- Shamus McGillicuddy, Enterprise Management Associates
 
- 
                News
                26 Mar 2007
                  Metasploit Framework 3.0 releasedBrief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                26 Mar 2007
                  Should I use data deduplication to manage unstructured data?Absolutely; there are two areas where data deduplication, or single-instance storage, can help... Continue Reading 
- 
                News
                26 Mar 2007
                  What are some of the biggest challenges with unstructured data?By far, the volume of data has to be the biggest challenge... Continue Reading 
- 
                News
                25 Mar 2007
                  Microsoft investigates Windows Vista Mail flawAttackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating. Continue Reading By
- 
                Feature
                22 Mar 2007
                  VoiceCon Spring: A transition show for the VoIP industryVoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show. Continue Reading 
- 
                News
                22 Mar 2007
                  Flaws haunt protocol tied to national infrastructureAlso: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                22 Mar 2007
                  Mozilla releases Firefox fixOne newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11. Continue Reading By
- 
                News
                22 Mar 2007
                  Midrange storage array specificationsProduct snapshots highlighting key specifications for a cross section of midrange storage array products. Continue Reading 
- 
                Feature
                21 Mar 2007
                  Symantec threat report under the microscopeThis week in Security Blog Log: Infosec professionals dissect Symantec's latest threat report and express a range of views in the blogosphere. Continue Reading 
- 
                News
                21 Mar 2007
                  Hackers broaden reach of cross-site scripting attacksAn explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet. Continue Reading 
- 
                Feature
                21 Mar 2007
                  Measuring Vista's true security muscle will take timeResearchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading 
- 
                News
                20 Mar 2007
                  NAC panel says technology may not add upA panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                News
                20 Mar 2007
                  Symantec says fixing licensing portal top priorityCompany officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                19 Mar 2007
                  Internet complexity, insecurity could stifle innovation, expert saysSecurity threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                Feature
                18 Mar 2007
                  Mobile data services development trends in 2007Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading By- Darrell Jordan-Smith
 
- 
                News
                18 Mar 2007
                  Symantec: Data thieves thrive on zero-day flawsAccording to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007. Continue Reading By
- 
                News
                18 Mar 2007
                  Hacker techniques use Google to unearth sensitive dataThose who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns. Continue Reading By
- 
                News
                15 Mar 2007
                  Cisco buys WebEx for $3.2 billionCisco plans to buy WebEx, maker of hosted, on-demand collaboration applications. Continue Reading By- Andrew R. Hickey, Senior News Writer
 
- 
                News
                14 Mar 2007
                  Emulex launches storage virtualization applianceEmulex has packaged a chip from its Aarohi acquisition into an appliance that could be a lower cost hardware platform for storage virtualization software products. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                13 Mar 2007
                  NEC reveals HydraStor grid storageNEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication. Continue Reading By- Jo Maitland, TechTarget
 
- 
                News
                08 Mar 2007
                  Review: eGuardPost a B+ overalleGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities. Continue Reading By- Steven Weil, Point B
 
- 
                News
                08 Mar 2007
                  Review: Sun Java System Identity Manager 7.0 'impressive'Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. Continue Reading By
- 
                News
                07 Mar 2007
                  Microsoft cancels Patch Tuesday as DST loomsIT administrators who are struggling to apply all their daylight-saving time (DST) patches will get a break from Microsoft next week, as no new security fixes will be released. Continue Reading By
- 
                News
                07 Mar 2007
                  Microsoft outlines software-centric VoIP, UCMicrosoft unveils its vision of a software-based VoIP system to enable unified communications. Continue Reading By- Andrew R. Hickey, Senior News Writer
 
- 
                News
                05 Mar 2007
                  Nortel switch release focuses on unified communicationsNortel today released two new switch series aimed at unified communications deployments. Continue Reading By- Andrew R. Hickey, Senior News Writer
 
- 
                News
                04 Mar 2007
                  NetApp stokes midrange fires with new arrayThe FAS 3040 is a scaled down version of the 64-bit 3070 architecture; NetApp officials say more moves downmarket will follow. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                04 Mar 2007
                  Buzz builds around data reduction for primary storageAnalysts predict that in-band compression offerings from StoreWiz, newly updated this week, are the first step toward a new wave of primary storage deduplication products. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                04 Mar 2007
                  Expert: NAC not a network security cure-allAccording to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                News
                02 Mar 2007
                  Police force secures data with biometricsHumberside Police has issued biometric USB drives among staff to maintain data security. Continue Reading 
- 
                News
                01 Mar 2007
                  Linksys, Gateway launch low-end NASCisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers. Continue Reading By- SearchStorage.com
 
- 
                Feature
                28 Feb 2007
                  PING with Mark OdiorneMark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritising security for senior management and keeping compliant. Continue Reading 
- 
                News
                28 Feb 2007
                  RFID cloning presentation moves forward despite legal threatsChris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading 
- 
                Feature
                28 Feb 2007
                  RFID dispute: Vendors still hostile toward full disclosureMany vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading 
- 
                News
                27 Feb 2007
                  McAfee fixes flaw in Mac antivirus softwareAttackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                27 Feb 2007
                  'Worm' targets Sun Solaris Telnet flawSecurity researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet. Continue Reading By
- 
                News
                27 Feb 2007
                  Wireless security: IT pros warily watching mobile phone threatsSecurity experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. Continue Reading By
- 
                News
                26 Feb 2007
                  HP acquires clustered file system software maker PolyServeHP announced its intent to acquire clustered file system maker PolyServe. Continue Reading By- Jo Maitland, TechTarget
 
- 
                News
                26 Feb 2007
                  Storm rages again: Self-morphing Trojan uses blogs to spread rootkitsA new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments. Continue Reading By
- 
                News
                25 Feb 2007
                  HP announces iSCSI VTL for SMBsHP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                News
                25 Feb 2007
                  PatchLink acquires STAT Guardian toolPatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp. Continue Reading By
- 
                Feature
                22 Feb 2007
                  Microsoft takes a blogosphere beating over Vista UACThis week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature. Continue Reading 
- 
                News
                22 Feb 2007
                  Google offers 10 GB inboxThe search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version. Continue Reading By- SearchStorage.com Staff
 
- 
                Feature
                22 Feb 2007
                  Flaws haunt Symantec, IBM, Cisco and IEBug Briefs: Security holes plague Symantec Norton products, IBM DB2; Mozilla Firefox; Trend Micro ServerProtect; Cisco IP phones; Google Desktop; IE and Snort. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                21 Feb 2007
                  Cisco warns of IP phone flawsAttackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. Continue Reading By
- 
                Feature
                21 Feb 2007
                  Data breach: If customers don't act, data will remain at riskTo make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading 
- 
                News
                20 Feb 2007
                  Microsoft confirms new IE flawAttackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday. Continue Reading By
- 
                News
                20 Feb 2007
                  Google plugs dangerous flawAn attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                News
                19 Feb 2007
                  Sourcefire fixes Snort flawAttackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Continue Reading By
- 
                News
                19 Feb 2007
                  When security firms merge, some users are losersSome users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold. Continue Reading By
- 
                Feature
                15 Feb 2007
                  Questions fly as EMC Retrospect fadesAll signs point to the end of life for EMC's Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel. Continue Reading 
- News 12 Feb 2007
- 
                News
                12 Feb 2007
                  Mobile carriers admit to malware attacksEighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. Continue Reading By
- 
                News
                12 Feb 2007
                  Microsoft fixes zero-day flaws in Word, OfficeTwelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office. Continue Reading By
- 
                News
                12 Feb 2007
                  Skype makes more enterprise inroadsSkype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise. Continue Reading By- Andrew R. Hickey, Senior News Writer
 
- 
                News
                11 Feb 2007
                  Cybersecurity czar signals government cooperation at RSA ConferenceCybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats. Continue Reading By- Marcia Savage, Features Editor, Information Security Magazine
 
- 
                News
                11 Feb 2007
                  Solaris 10 has zero-day Telnet flawAttackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn. Continue Reading By
- 
                News
                10 Feb 2007
                  Cisco VoIP management guide: VoIP management lifecycleVoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements. Continue Reading 
- 
                News
                10 Feb 2007
                  Cisco VoIP managment guide: Required management tasksComprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is categorized here. Continue Reading 
- 
                News
                08 Feb 2007
                  Roundup: Vista security, breakability touted at RSA ConferenceAt RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking. Continue Reading By- SearchSecurity.com Staff
 
- 
                News
                08 Feb 2007
                  New storage IPOs report lossesOf the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies. Continue Reading By- SearchStorage.com Staff
 
- 
                News
                07 Feb 2007
                  VoIP capabilities save hotel money, keep guests connected"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities. Continue Reading By- Andrew R. Hickey, Senior News Writer
 
- 
                News
                07 Feb 2007
                  Briefs: Vulnerabilities found in Trend Micro, Firefox browserThis week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws. Continue Reading By- Edmund X. DeJesus, Contributor
 

 
		