Monthly Archives: March 2010
IDC Unveils PC Market Predictions for 2010
IDC released its 2010 predictions for the PC market, and the analyst firm says virtual desktops, WiMax and a return to desktops are in...
Avaya Introduces UC Solution IP Office 6.0
Unified communications specialst Avaya announced the release of IP Office 6.0, a UC solution offering collaboration tools such as voice, instant messaging, presence and...
IceWeb Offers Iplicity Data Storage Platform
Storage solutions and online cloud computing application services provider IceWeb announced the launch of its Iplicity Data Storage platform, which enables the incorporation of...
IT Career Advice: Questions for a Technology Career Expert, Part 2
The following is Part 2 of a question-and-answer session with technology-career author Janice Weinberg. Weinberg is a former IBM system programmer and a General...
IT Career Advice: Questions for a Technology Career Expert, Part 1
Janice Weinberg is a former IBM system programmer and a General Electric faculty member at the Management Development Institute, and currently runs the career-services...
Microsoft Plans Office 2010 Release in May for Businesses
Businesses will be able to purchase the full version of Office 2010 May 12, roughly a month before consumers get their hands on Microsoft's...
How to Reduce Security Risks Associated with Storing Credit Card Data
Companies that follow best practices in data security have a risk assessment program. As outlined by the United States General Accounting Office (GAO), risk...
Google Buzz, Latitude May Be Integrated, Google Says
Google will try different points of integration between Google Latitude and the new Google Buzz for mobile application, a product manager for the company...
Cloud Computings 7 Deadliest Security Risks
Cloud Computings 7 Deadliest Security Risks
by Brian Prince
Abuse and Nefarious Use of the Cloud
IAAS (infrastructure-as-a-service) providers are open to abuse with lenient registration processes,...
How to Increase Security and Manageability with Thin Computing
With threats to data security on the rise and limited resources available, companies are constantly looking for ways to improve the security and manageability...