Monthly Archives: January 2009
Green-minded Google Gets Red-faced Over Search Energy Consumption Claims
A Harvard University physicist told the Times that executing two Google searches on a computer can generate almost the same amount of CO2 (carbon...
List of Most Dangerous Programming Errors Changes IT Security Discussion
SQL injection, cross-site scripting - the list of security issues affecting the programs we use daily goes on and on. So often, however, conversations...
Survey: Half of All Developers to Work on SAAS Within a Year
According to the latest Evans Data Global Development Survey, over half of all developers expect to work on programs delivered in the software-as-a-service model...
Report Names Top 25 Worst Programming Errors
Although a recent survey suggests small to medium-size business owners will focus more on data protection than virus prevention in 2009, a vulnerability report...
Seagate to Cut 800 U.S. Jobs, CEO Watkins Resigns
Seagate Technology, the world's largest maker of hard disk drives for servers, storage and PCs, became another victim of the recession Jan. 12 when...
Nortel Launches Line of 10G Ethernet Switches for Enterprise Networking
Networking hardware and software provider Nortel on Jan. 12 launched the Nortel ERS 5600 series line of Ethernet routing switches, which have 10 Gigabit...
eWEEK Labs Walk-through: ForeScout CounterACT 100
eWEEK Labs Walk-through: ForeScout CounterACT 100
By Matthew D. Sarrel
No Title
One of the ForeScout CounterACT 100's greatest strengths is its Web-based assets portal, which allows...
Rubyists Unite! Ruby on Rails, Merb to Merge in Rails 3
Rubyists of the world unite!Well, that's exactly what happened over the recent holiday break. The once warring Ruby on Rails and rival Merb communities...
eWeek Newsbreak, Jan. 12, 2009
var sPath = window.location.pathname;var moviename = new Array();moviename = sPath.split("/");var config = new Array(), configSponsor = new Array();config = 6970546001; //the default video loaded...
ForeScout CounterACT 100 a Full-Featured NAC Offering
Enterprises looking for greater protection of their networks often look to network access control technology to evaluate endpoint security status and enforce which systems...