- Welcome Guest
- Sign In
WiFi features are as standard on today's portable computers as built-in modems used to be. Laptop users have become accustomed to the ability to connect to the Internet from practically anywhere to reach e-mail, Web sites and music download portals. Consumers even use wireless routers to connect to ...
The Linux operating system is not immune to virus infections, although Linux-specific viruses are extremely rare. Linux servers face more risk of virus attack than Linux desktops. That said, IT security and control firm Sophos recently issued a warning about potential virus infections targeting Linu...
Web 2.0 technology is revolutionizing the way businesses display their wares on e-commerce sites. The service delivery model of Web 2.0 presents a pressing challenge to Web designers in small businesses and home-based businesses. Anyone with a community-based information and public comment Web site ...
3Tera, based in Aliso Viejo, Calif., has made a sizable step forward in the on-demand or utility computing market. The company provides other enterprises, both large and small, with a new technology called "disposable infrastructure." This technology forms the foundation of its AppLogic product, a f...
In the 1980s, auto manufacturers began using simple computers called the "engine control unit," or ECU, to monitor and regulate such things as fuel mixture and spark plug timing. Since then, a cottage industry has developed around hardware and software to bypass, tinker with or replace this system.
Plano, Texas-based Docudesk, which makes software tools to convert proprietary file formats such as Adobe's PDF, recently introduced an enterprise version of its deskUNPDF document conversion line. The launch of deskUNPDF Professional provides users with new feature options and conversion formats to...
Open source software is making its way into the systems that touch our everyday lives, from our banks to the stores where we shop. Open source is also found in some of the IT systems that manage traffic flow on city streets, state highways and in the skies. In fact, throughout the overlapping transp...
Information technology managers are facing a massive rollout of new demands and computing models that could potentially make inroads in enterprise computing in 2008. As the technology continues to evolve and the landscape continues to change, IT managers have to pick and choose carefully in deciding...
Give office workers familiar with the Microsoft XP operating system an opportunity to try the same navigational tasks at a Linux-based desktop. Then step back and wait for the reaction. First will come the surprised look. Then questions like "where did the command line go?" will soon follow. That's ...
Depending on which set of criteria you reference, ID fraud either is on a significant decline or will be a lingering threat for several more years. The general trend points downward. Overall, 2007 saw a 12 percent drop in ID fraud incidences to $6 billion, according to Javelin Strategy & Researc...
There are approximately 20 million small businesses in the United States. Even for a large firm, finding the right person for any given job can be like finding a needle in a haystack. When you're a small business, finding reliable and affordable talent can be even more difficult. Filling that niche ...
Wikis are finally becoming a useful tool for collaboration and information sharing in the workplace. However, like all business tools exposed on the Internet or corporate intranet, IT managers have to view their deployments with a stern eye regarding who can use them and what corporate information m...
A study by the Authentication and Online Trust Alliance shows that more than half of all e-mail is authenticated. However, the Alliance wants the industry to push for higher adoption. AOTA has issued a call to action to implement e-mail authentication at the top level corporate domain within the nex...
It could only be a matter of time before someone found a formula for taking the immediacy of YouTube and the entrepreneurship of eBay and wrapping them around an original Internet mainstay -- the conversation of the Bulletin Board System. That time has arrived with the debut of BigThink.com. BigThin...
Kace announced Monday what it called the first virtual systems management appliances to run natively within the VMware infrastructure. The Virtual Kbox appliances offer users a software product that runs on the user's existing computer hardware. Earlier versions of the Kbox appliance required the in...
PostPath on Wednesday announced the release of PostPath Email Server 3.1, which offers small and medium-sized businesses an alternative to Microsoft Exchange. Email Server 3.1 is interoperable with the Exchange ecosystem as well as BlackBerry and ActiveSync devices. PostPath's e-mail and collaborati...
In January, network security tools startup Packet Analytics launched Net/FSE, or Network Forensic Search Engine. Net/FSE is the first commercial search engine for enterprise network data to focus on security incident response by harnessing the analysis of NetFlow data. It is designed to exploit the ...
In order to turn bigger profits from their armies of compromised computers, hackers this year will use a new tactic in targeting master boot records with viruses that plant rootkits on computers' hard drives, security experts warn. These infections activate during the boot sequence before the operat...
The 2008 presidential primaries capture the lion's share of election season media exposure, but an equally critical campaign is running quietly in the background. The controversial decision to implement various types of electronic voting machines in place of paper ballots is garnering little public ...
Managers of enterprise networks are becoming more aware of the importance of IT risk management issues even though they still cling to four so-called myths that give a false sense of security, according to Symantec. The security vendor on Wednesday released its IT Risk Management Report Volume II, w...
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/02/developers.jpg
https://www.linuxinsider.com/story/open-source-2022-wins-and-losses-176832.html
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/02/open-source-sign.jpg
https://www.linuxinsider.com/story/fastly-commitment-failing-office-free-replacements-advance-open-source-176792.html
Fastly Commitment, Failing Office, Free Replacements Advance Open Source
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2023/01/devops.jpg
https://www.linuxinsider.com/story/2023-year-of-the-software-developer-177724.html
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/05/network-engineers.jpg
https://www.linuxinsider.com/story/github-hides-code-flaw-reports-new-rhel-and-almalinux-amazon-deploys-dentos-176752.html
GitHub Hides Code Flaw Reports, New RHEL and AlmaLinux, Amazon Deploys DentOS
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/04/mobile-app-development.jpg
https://www.linuxinsider.com/story/appdome-ceo-on-mobile-app-security-no-developer-no-code-no-problem-176637.html
Appdome CEO on Mobile App Security: No Developer, No Code, No Problem
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2023/01/malware-alert.jpg
https://www.linuxinsider.com/story/linux-malware-rates-rise-to-record-levels-amid-hacker-inconsistency-176834.html
Linux Malware Rates Rise to Record Levels Amid Hacker Inconsistency
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/02/linux-review-tux-keyboard.jpg
https://www.linuxinsider.com/story/new-nitrux-not-up-to-ui-standards-176853.html
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2023/01/linux-chromebook.jpg
https://www.linuxinsider.com/story/how-to-run-a-full-linux-desktop-on-a-chromebook-176864.html
https://d1vk3m4dx2p0us.cloudfront.net/wp-content/uploads/sites/2/2022/10/unix.jpg
https://www.linuxinsider.com/story/unix-basics-it-pays-to-know-176679.html