Search

Results 1481-1500 of 1807 for Jack M. Germain.

Can E-Mail Authentication Kill Spam?

A study by the Authentication and Online Trust Alliance shows that more than half of all e-mail is authenticated. However, the Alliance wants the industry to push for higher adoption. AOTA has issued a call to action to implement e-mail authentication at the top level corporate domain within the nex...

STARTUP TO WATCH

BigThink.com: Seeking Big Thinkers and Big Sponsors

It could only be a matter of time before someone found a formula for taking the immediacy of YouTube and the entrepreneurship of eBay and wrapping them around an original Internet mainstay -- the conversation of the Bulletin Board System. That time has arrived with the debut of BigThink.com. BigThin...

Kace Tucks Virtual Systems Management Into VMware Infrastructure

Kace announced Monday what it called the first virtual systems management appliances to run natively within the VMware infrastructure. The Virtual Kbox appliances offer users a software product that runs on the user's existing computer hardware. Earlier versions of the Kbox appliance required the in...

PostPath Offers Up Alternative to MS Exchange

PostPath on Wednesday announced the release of PostPath Email Server 3.1, which offers small and medium-sized businesses an alternative to Microsoft Exchange. Email Server 3.1 is interoperable with the Exchange ecosystem as well as BlackBerry and ActiveSync devices. PostPath's e-mail and collaborati...

STARTUP TO WATCH

New Analytics Tool Puts NetFlow Data Under the Microscope

In January, network security tools startup Packet Analytics launched Net/FSE, or Network Forensic Search Engine. Net/FSE is the first commercial search engine for enterprise network data to focus on security incident response by harnessing the analysis of NetFlow data. It is designed to exploit the ...

Old Hack, New Twist: When Rootkits Grab Hold of MBRs

In order to turn bigger profits from their armies of compromised computers, hackers this year will use a new tactic in targeting master boot records with viruses that plant rootkits on computers' hard drives, security experts warn. These infections activate during the boot sequence before the operat...

A Far-Fetched Fix for E-Voting Woes: Open Source

The 2008 presidential primaries capture the lion's share of election season media exposure, but an equally critical campaign is running quietly in the background. The controversial decision to implement various types of electronic voting machines in place of paper ballots is garnering little public ...

Symantec Goes Myth Busting With New IT Risk Management Study

Managers of enterprise networks are becoming more aware of the importance of IT risk management issues even though they still cling to four so-called myths that give a false sense of security, according to Symantec. The security vendor on Wednesday released its IT Risk Management Report Volume II, w...

Black Duck Offers Developers a New Tool to Manage Code

Black Duck Software announced today the availability of Black Duck Code Center software to help manufacturers accelerate software development through the managed use of open source and third-party code. Code Center manages software component selection, project approval and license tracking designed ...

HP Unveils Three-Pronged FOSS Governance Initiative

HP announced Thursday a three-part software governance initiative to help companies address the legal, financial and security demands associated with using free and open source software. The company is donating its intellectual property for monitoring open source products to a new open source commun...

McAfee Aims to Padlock Confidential Customer Data

McAfee announced Monday a security suite that provides enterprise users with host data loss prevention, device management and endpoint encryption to ensure compliance and limit exposure to fines. McAfee Total Protection for Data, a solution for data loss and data leakage protection, has full visibil...

STARTUP TO WATCH

Payoneer: Taking Prepaid Debit Cards to the Next Level

The growth of e-commerce and the continuing expansion of outsourcing and the remote workforce are fueling a new approach to paying for services. Internet-focused companies are replacing traditional online payment transactions with prepaid debit cards. Payoneer is a startup firm that is pushing this ...

Is Hidden Open Source Code Putting Your Apps at Risk?

Many companies are running software on their Web servers that contains open source code with known vulnerabilities, a security firm has found. Software risk management solutions firm Palamida has expanded its Vulnerability Reporting Solution detection capabilities to include 431 open source security...

Coders Going Mercenary: From Community to Corporation

The career path to the software industry used to be cut and dry. Coders had a choice of either developing projects as part of a remotely dispersed community or punching a clock as a slave to a commercial software house. The former usually meant being considered a player in the software bush league.

Open Source Census: An Enterprise Head Count

OpenLogic, a provider of open source packages, has begun the task of quantifying the extent of open source code used on enterprise computers. The company will roll out its global Open Source Census in several phases over the next six months. In early December, OpenLogic announced the first phase wi...

Earning Your Linux Diploma

Certifying Linux technicians is a developing trend. The Linux OS is growing up. This is pushing many computer engineers and IT professionals to prove their skills as programmers and systems administrators. While not quite a common job requirement yet, some employers and high-level software developer...

The Road to Enterprise Web 2.0: Bumpy and Still Under Construction

"Web 2.0" was one of the computing industry's biggest catch phrases of 2007. Much like a software upgrade, Web 2.0 brings to mind images of bug fixes and new features. In reality, however, Web 2.0 is nothing more than a new round of Internet functionality bolted onto a very tired and old World Wide ...

BEST OF ECT NEWS

Behind the Browser: Layout Engines Do Heavy Lifting

When a Web surfer clicks on an icon to launch his or her favorite Web browser, only the geekiest of the geeky pay any thought to which engine layout is at work. The typical Web user has no clue that a different browser choice may also include a different browser layout engine. If anything, most Inte...

Whither OpenDocument Format?

Shakespeare wrote that a rose called by any other name would still smell as sweet. Proponents of open source software and standardizing document formats might wonder whether the same sentiments apply to the poetry between the OpenDocument Format, or ODF, and the Compound Document Format, or CDF. Th...

BEST OF ECT NEWS

The Pathway to Linux Developer Stardom

Five years ago, the only engineering or computer science majors setting their sights on a career in writing software code for an open source company were the most hardcore of computer nerds. That was something done only by the true computer geeks, and it usually required an independent source of inc...

LinuxInsider Channels