Monthly Archives: April 2009

Obama’s BlackBerry Getting Final Security Touches

0
What the president wants, the president gets, and Barack Obama wants to be the first smartphone-packing president in U.S history. Obama, who had to...
1

The 10 Most Interesting Products at RSA 2009

0
The 10 Most Interesting Products at RSA 2009 Altor Networks Virtual Firewall Built solely for the virtualized data center, the Altor Virtual Firewall enforces security policy...

How to Sustain Profits in a Downturn Using Effective Pricing Strategies

0
In this current economic climate, cost-reduction strategies that involve reducing work force, curtailing new investments or consolidating operations are the most tried and tested...
1

‘Jaunty Jackalope’ Ubuntu 9.04 Sets Out to Conquer Cloud, Netbook Territory

0
'Jaunty Jackalope' Ubuntu 9.04 Sets Out to Conquer Cloud, Netbook Territory Exchange Support in Evolution Ubuntu's GNOME 2.26 desktop environment brings with it support for Microsoft's...

Ubuntu 9.04, the Jaunty Jackalope, Sports Modest Software Improvements But Big Plans

0
Canonical's Ubuntu 9.04 hit the world's FTP mirrors on April 23, bearing a modest collection of software updates and enhancements and an ambitious road...

Apple ‘Baby Shaker’ App Could Change Rules for Developers

0
Apple removed the controversial "Baby Shaker" application, in which users could "shake" a virtual infant quiet using their iPhone, from the App Store.Representatives from...

AMD Phenom II X4 955 Black Edition Now Available

0
Advanced Micro Devices has launched an update to it Dragon platform, along with an addition to its Phenom II X4 family of gaming chips...

To Lay Off or Not Lay Off?

0
That is the question that many companies answer by a resounding "Unfortunately, yes."But some companies are questioning the wisdom in layoffs if an economic...

EMC Revenues, Profit Margin Nosedive

0
EMC's revenue and profit margin took major hits in the first quarter of 2009, the storage giant reported April 23 in its first-quarter 2009...

RSA: The Elusive Structure of the Cyber-criminal Economy

0
As it turns out, stealing credentials is actually the easy part of cyber-theft. The hard part is using them to pilfer bank accounts.Fortunately for...