ADS BY GOOGLE

db4objects, creator of the open source object database for Java and .NET has announced that Jerry Fiddler, founding CEO of the embedded software company Wind River, has joined the company's board of directors.
Findings from Sophos show that the most widespread threat from January to date is the Sober-Z worm, which at its peak, accounted for one in every 13 emails, even though it was programmed to stop spreading on January 6, 2006. New Trojans now outweigh viruses and worms by 4:1, compared t...
A lawsuit filed in a U.S. District Court in Seattle by a Los Angeles resident allges that Microsoft has not adequately disclosed details of its WGA (Windows Genuine Advantage) feature when it was delivered to PC users through the company's Automatic Update system.
Information security, information storage. Two topics that often go together, but now taken to new levels by the breaking story about storage giant EMC buying security goliath RSA. One thing, neither of the two Boston-area companies will have to anyone very far, and perhaps their simil...
Sun Microsystems has announced that it has withdrawn from the Aperi open source storage management initiative started by IBM in October 2005. Sun is a proponent of open source projects across its portfolio and has been a major supporter of this initiative in its formative phases. Given...
Credit Suisse downgraded Novell (NOVL) to neutral from outperform, noting the company's quarterly results for the second quarter. This comes several weeks after a more recent upgrading of the stock by analysts at Jefferies and Co.
Mark Canepa, who's been running storage over at Sun, is leaving the company - whether voluntarily or involuntarily is unclear - so Sun's new CEO Jonathan Schwartz is moving Sparc server boss David Yen in to replace him. Yen will report directly to Schwartz.
Storage giant EMC Corporation has acquired a privately held North American-based IT professional services firm, Interlink. The company will become a part of EMC's expanding Microsoft Practice within EMC Technology Solutions.
InfoParc has announced the release 4.54 of the absoluteBUSY web CRM software. The release includes a new sales module plus a new keyword/tagging feature. An unlimited, freely defineable set of markers/tags can be applied to companies, contact persons and projects.
'I'm for more women in technology, but against affirmative actions of any kind,' says Yakov Fain, Java Developer's Journal Enterprise Java Editor. His remark comes in a discussion thread triggered by a blog posting he wrote earlier this week in which he noted, while watching the live S...
Equifax Inc. announced that it has formed a joint venture with ATM Corp. to launch a national settlement services company. Equifax Settlement Services LLC will provide a complete set of mortgage settlement offerings, including title, closing and appraisal services.
'Digi-Data has a history of providing innovative technology,' said Dennis Cindrich, President and CEO of Digi-Data. 'bigVault's secure online services expand our product offering by helping customers cost-effectively store and access large amounts of digital content from anywhere in th...
Bradmark's Surveillance DB for Sybase ASE simplifies database management by providing detailed statistics on session and process activity, locked sessions, batch contention, file I/O and much more, which can all be viewed simultaneously for multiple databases. It is shipped with a set ...
My purpose today is to examine the question about whether the hottest topics in software development right now--Open Source, Ajax, and Web 2.0--offer any relief. My attention was drawn to recent coverage of three classic Web 2.0 companies, flickr, myspace, and youtube.
An exploit has been published for a vulnerability found in Microsoft Internet Explorer which could be used by attackers to run arbitrary code on target systems. The flaw is due to an error when processing a 'createTextRange()' call related with control objects.
Gauntlet's technology is designed to detect potential problems before they have a chance to impact other developers by automatically pre-screening all new code against a set of quality guidelines before it enters the build process. This reduces the number of broken builds that can impa...
A technical paper delivered during a conference on 15 March, in Pisa, Italy, entitled 'Is Your Cat Infected with a Computer Virus?' has claimed that RFID tags can be used to corrupt databases and even potentially to spread computer viruses. However AIM Global, the trade association for...
Fourteen years ago I warned MyBank (who is not one of my clients, I am one of theirs) about using social security numbers as solid identification. The Head of Security, three weeks retired from the Secret Service, said he would look into it. Nothing has changed except the security at M...
Enterprises and government agencies are using smart card-based credentials more and more. Organizations around the globe are striving to protect corporate information assets, address regulatory compliance pressures, and achieve cost savings and increased security through the convergenc...
In a move the companies say will bring unique management benefits to the broad number of users of Microsoft Systems Management Server 2003 (SMS) for the first time, Intel plans to connect its new Intel Active Management Technology (Intel AMT) with Microsoft SMS, substantially enhancing...
'The world virus map is an excellent resource for quickly understanding the virus situation at any given time,' said Mikko Hypponen, Chief Research Officer at F-Secure said, as his company introduced the concept of 'virus maps' - a visual representations of virus infections worldwide...
Storage is still one of the most costly and fastest-growing aspects of everyone's network and is likely to remain so for some time. Every network user is a storage user. We're all part of a community that shares the costs and the benefits of this expensive resource. Storage management ...
ChoicePoint, CardSystems, LexIsNexIs, Polo Ralph Lauren. The headlines in 2005 were littered with cases of high-profile security breaches and customers, partners, and government are increasingly holding businesses accountable for the security of their applications. Poor application sec...
A worm and a virus, both attacking Mac OS X, have been reported, the first instances of Apple's previously impervious operating system being attacked. OSX/Inqtana.A is a proof of concept worm for Mac OS X 10.4 (Tiger). It tries to spread from one infected system to others by using Blu...
I am pleased to announce that Software Tool & Die Inc. has just released a new version of the SQLXtract utility (10.2.1) that reverse engineers Sybase's proprietary SQL format (PBSELECT) into ANSI, PL/SQL or TransAct SQL from the 'DataWindow' object. The new version of the SQLXtract ut...
Symantec CEO James Thompson warns against an erosion in consumer confidence as the biggest threat to the continued growth of e-commerce, rather than a single hostile attack. Thompson made his remarks at a keynote speech at the RSA Security Conference in San Jose.
Nexaweb has been seeing rapid RIA adoption in Japan, particularly in the financial industry, and so has entered into a strategic alliance with Hitachi Systems and Services, Ltd. (Hitachi Systems), one of the largest providers of systems integration services in Japan.
McAfee has partnered with Sony Ericsson to provide mobile security solutions on the new P990i and M600i. McAfee VirusScan Mobile and McAfee Firewall Mobile will be included with the Sony Ericsson smartphones - both of which offer Internet access, e-mail, and video conferencing.
'I say we avoid criticizing organizations that take steps to improve systems,' says Informational Storage & Security Journal Co-editor in Chief, Patrick Hynds. 'To assume that Cyber Storm will produce a negative result is cynical,' he continues; 'I have participated often in security a...
With the RFID Anywhere Appliance Edition, engineers can build RFID readers that are both intelligent and easily managed, thereby significantly reducing the cost of ownership. Through remote management, reader configurations can be quickly and automatically restored, drastically reduci...
Sun Microsystems, Inc. today announced its new world-record setting Sun Ultra(TM) Workstations, including the fastest x64 (x86, 64-bit) workstation in the industry. The new Sun Ultra Workstations provide customers with more options for operating systems than any other vendor, includi...
Bots - programs that go resident on computers waiting for commands from their creator, usually via IRC - now represent more than 20 percent of the total new malware detected, says a report based on 2005. They are often used to make up extensive networks, popularly known as 'botnets,' w...
it will be hosting its Third Annual Investor Day on Monday, February 13, 2006 from 8:00am to Noon (PST) in San Jose, CA.
EMC Corporation today introduced a broad range of new storage and virtualization solutions, including availability of the world's largest and most flexible high-end storage array, innovative new file system software and new network attached storage (NAS) virtualization capabilities. T...
McAfee, Inc. , the leader in Intrusion Prevention and Security Risk Management, today announced the appointment of Dale Fuller to the McAfee Board of Directors, effective January 20, 2006.
CA today pledged 'day one' support, and plans for early exploitation of IBM's newly announced System z9 Integrated Information Processor (zIIP), a specialty engine that will run portions of eligible workloads designed to help free up general computing capacity on the IBM System z9 mai...
Harvard Law School's Berkman Center for Internet & Society and Oxford University's Oxford Internet Institute are leading an iniative to fight 'badware' with the support of several prominent tech companies, including Google, Lenovo, and Sun Microsystems.
It emerged this week that KDE developer Maksim Orlovich had discovered an incorrect bounds check in kjs, the JavaScript interpreter engine used by Konqueror and other parts of KDE, that allows a heap based buffer overflow when decoding specially crafted UTF-8 encoded URI sequences. Acc...
'We are pleased to have collaborated with the Bulgarian authorities in their swift and effective action in this case,' said Horacio Gutierrez, associate general counsel for Microsoft Europe, as the Bulgarian law-enforcement National Services to Combat Organized Crime (NSCOC) agency arr...
Prior to using Asigra Televaulting from backup service provider, Storage Guardian, for vaulting their critical data from all 25 offices, Pro-Tax backed up each office to tape. This legacy tape method created challenges. ?We found that some backups failed to run when scheduled, or faile...


ADS BY GOOGLE