Monthly Archives: July 2008
IT Contractors: Fraud Is a Bad Idea
I'm going to go out on a limb here and say the economy is in a recession.When Nevada brothels need to give rebates for...
iPhone Day Is Deja Vu All Over Again
378 days ago, I spent a chunk of a day waiting in line for the privilege of being one of the first people to...
FCC Comcast Decision Just the Beginning
No matter the FCC's final decision on Comcast's blocking of peer to peer traffic, litigation is sure to follow. Just for starters, Comcast doesn't...
New Multimedia Trojan on the Loose
Researchers at gateway security specialist Secure Computing have identified a new Trojan virus being distributed in the wild via infected multimedia files.First detailed in...
iPhone, AT&T Activation Swamped by Long Lines
There is no shortage of live coverage of the iPhone. Almost all reports indicate long lines made worse by slow service. All fingers point...
Oracle to Release 45 Security Fixes
Oracle is preparing to release 45 security fixes across hundreds of its products July 15 as part of its upcoming Critical Patch Update.Although specific...
FCC Chief Finds Comcast Guilty of Network Neutrality Violations
Comcast is guilty of blocking consumers' access to the Internet and faces federal sanctions, FCC Chairman Kevin Martin said July 10. If Martin's fellow...
How to Get Started with Server Virtualization: 5 Top Tips
/images/stories/70x50/bug_knowledgecenter_70x70_%282%29.jpg
As demand rises for IT managers and C-level executives to embrace virtualization, I thought it would be worthwhile to share my insights into adopting...
How Various Network Access Control Technologies Work
/images/stories/70x50/bug_knowledgecenter_70x70_%282%29.jpg
From the perspective of end users, a Network Access Control deployment should be transparent, as if it's running all by itself. As users log...
How to Avoid Security Risks for Mobile Computing on Public WLANs
Wireless broadband Internet access via hotspots is convenient for both the casual surfer and the Internet-dependent teleworker. Unfortunately, current security technologies integrated into wireless...