Monthly Archives: September 2006
Malware Money Tough to Trace
Experts agree that the most effective way to defeat the current onslaught of technology-related attacks would be to dismantle the economics that back them...
Red Hat, JBoss Show Fruits of Acquisition
Linux vendor Red Hat on Sept. 18 will roll out a new series of open-source subscriptions that include offerings from recently acquired middleware provider...
Domino Horizons Widen
Two recent product introductions make it easier for companies to use Linux to deliver IBM Lotus Notes/Domino-based messaging, calendars and scheduling.At the end of...
Unicenter NSM Takes Leap Forward
With Unicenter Network and Systems Management r11.1, CA is jumping onto the centralized management database bandwagon. The company also is adding to its venerable...
Some Enigmatic Points About IT Security
The cracking of the German Enigma cryptosystem has inspired a host of books, including and sometimes combining both history and fiction. Its a compelling...
A Promotion for Browsers?
A little more than 10 years ago, an idea rose around what many at the time perceived as the next generation of computing—the concept...
Breach Causes Second Strife
Could it be the whole earth opening wide?" droned the demented Drudge. The Furry One sang the line from Duran Durans "A View to...
WebMethods Enriches SOA
WebMethods, which develops process integration software, announced Sept. 11 plans to acquire Infravio, a company best known for its service-oriented architecture governance repository and...
EMC to Buy Network Intelligence for $175 Million
Storage giant EMC announced Sept. 18 that it has agreed to purchase Network Intelligence for $175 million, and it has also completed its $2.1...
Morning Coffee, Sept. 18: Storage Size and Security Seize the Spotlight
On any given day, theres a center to the technology storm: some key combination of challenges facing buyers, innovations coming from suppliers and skills...