Monthly Archives: June 2008

Keynote: Flying KITE in the Cloud

0
As application developers move from building applications to run on their organization's own servers to writing applications for the cloud, there is more need...

LinkedIn Now Part of Xobni’s Social Inbox

0
Updated: Xobni, the startup that Microsoft almost bought to socialize its dated Outlook inbox, has now done a mind-meld with professional social network LinkedIn,...

Google Ad Planner No Threat to Nielsen, ComScore

0
Yesterday, I promised to look into whether or not Nielsen and ComScore were concerned about Google's new Ad Planner tool as some in the...

Microsoft, Adobe Issue Critical Patches

0
The hits just keep on coming, as two of the world's most high-profile software makers were forced to distribute security updates for critical vulnerabilities...

How to Translate IT Risk Management into Competitive Advantage

0
Every company has risk. In fact, risk can and should be construed as a good thing-no risk, no reward. What matters is how quickly...

How to Determine a Backup Strategy and Find the Proper Tools to Avoid Disaster

0
First of all, a small business should analyze its IT structure and determine which nodes of the IT infrastructure are critical for the business....

Virtualization Coming to a Desktop Near You

0
var sPath = window.location.pathname; var moviename = new Array();...

Five Ways Your Best Employees Can Compromise Your Network … And Not Even Know...

0
"I'm a small business. No one is going to bother trying to hack my network."Wrong.In fact, 56 percent of small businesses surveyed by the...

Microsoft Responds to the SQL Injection Problem

0
Last September, Errata Security CEO Robert Graham told us in an interview that SQL Injection was a great risk for Web sites based on...

How to Protect Against a Drive-by Pharming Attack

0
Drive-by pharming occurs when attackers create a Web page or e-mail that, when simply viewed, results in substantive configuration changes to a home broadband...