Monthly Archives: August 2015
Cumulus Offers VX Virtual Appliance for Testing, Development
Cumulus Networks officials want to make it easier for organizations to leverage the company's Linux-based network operating system to learn about, test and develop...
Net Neutrality Court Date Set for Appeal by Opponents
A court appeal filed by net neutrality opponents will be heard Dec. 4 in Washington, D.C., as critics of the FCC's moves earlier this...
Infrascale Offering Guaranteed 15-Minute Disaster Recovery
Companies, especially those in the IT trade, have to be very careful with the word "guarantee" for obvious reasons. Lawyers, certainly, love the term.Infrascale,...
Site24x7, VictorOps Revamp DevOps Solutions
Zoho’s Site24x7, a cloud monitoring service for DevOps and IT operations, has announced the launch of its Network Monitoring beta, which provides performance insight...
Chinese VPN Provider Using Malware to Expand Network
A Chinese virtual private network (VPN) service, dubbed "Terracotta" by security researchers, has compromised hundreds of Windows servers to use as part of its...
Ciena Closes Cyan Deal, Launches Network Software Unit
Ciena, now that it has brought Cyan into the fold, is bringing its growing networking software resources under the umbrella of its new Blue...
RIG 3.0 Exploit Kit Hits Adobe Flash Users Hard
Today's topics include researchers' look inside the RIG Flash exploit kit, three major car makers complete a deal for the Nokia advanced digital mapping...
Acer Cloudbooks Offer Windows 10 Options to Chromebooks
Acer is rolling out Windows 10-based alternatives to the increasingly popular Chromebooks.The PC vendor, which has its own portfolio of Chromebooks, this month will...
OnePlus 2 Has Price, Features to Take On Top Smartphone Models
OnePlus 2 Has Price, Features to Take On Top Smartphone Models
Can the new OnePlus 2 compete against the smartphone giants? OnePlus believes it can....
Bug Bounty Programs Paying Off for Vendors, Security Researchers
Bug Bounty Programs Paying Off for Vendors, Security Researchers
More companies are finding bug bounty programs to be an effective method of improving security. And...