Monthly Archives: October 2005
The Force Is with IP
Space-based systems are the last bastion of handcrafted, custom-built technology. The unit volumes are small. The intervals between one procurement cycle and another are...
TelCove Steps Up Its Metro Ethernet Pace
For enterprises with multiple locations that require very high-capacity connections, such as hospitals and colleges, TelCove Inc. this week will ramp up its metropolitan...
Fujitsu Adds Opterons to Its Server Line
Fujitsu Computer Systems is the latest OEM to bring Advanced Micro Devices Opteron chip to its server line. The company in November will begin...
Sample RFP: Access Control
An RFP for an end-user network access control solution should be guided by knowledge of the types of laptops, handhelds and PCs that are...
Microsoft Working on Wi-Fi Virtualization
Researchers at Microsoft have created the prototype for new Wi-Fi software that allows a user on a PC with a single network card to...
Citrix Extends IP Offerings
The advance of voice-over-IP systems is blurring the line between the PC and the telephone, making the PC as convenient as the phone and...
Bug Hunting, Step by Step
Microsoft Corp. is spending time and money—lots of it—courting people such as Tom Ferris, an independent security researcher who runs the Web site Security-Protocols.com....
Microsoft Trustworthy Computing Timeline
December 2000Formation of the Security Services Partner Program (searchable Web-based database where customers can locate immediate help in dealing with security issues in their...
Hats Off to Microsoft Security Efforts
Attending the RSA security conference five years ago in San Jose, Calif., I sat in the audience while a member of the Microsoft "security"...
Sana SafeConnect Sniffs Out Spyware
Sana Security Inc. will release a desktop product next month that uses the companys behavioral malicious-code detection technology to find and remove spyware, keyloggers...