Monthly Archives: March 2016
HPE Expands Open Infrastructure Portfolio for Service Providers
Hewlett Packard Enterprise is bringing storage into its growing portfolio of open data center infrastructure systems and expanding its lineup of open networking switches.HPE...
Government Making Progress With Data Center Consolidation
Government agencies are making progress when it comes to data center consolidation efforts but planned savings goals need to be established, according to a...
More Mac Ransomware Sure to Surface Despite Halt to First Attack
The first try at creating ransomware for the Macintosh was a bust, according to a spokesperson at Apple who told eWEEK that the company...
Logitech, Intel Partner on NUC-Powered Video Conferencing Kit
Logitech officials continue to rapidly grow the company's portfolio of video conferencing products that can be used in the enterprise and smaller businesses.The company...
Mozilla Takes the Curtain off Its First IoT Projects
Mozilla announced the first of its Internet of things projects that are evolving out of what was once its promising Mozilla Firefox OS operating...
First Mac Ransomware Poses Little Risk for Users
A ransomware group targeted Mac users with the first fully functional malware program capable of encrypting data and demanding a ransom of 1 Bitcoin,...
Salesforce Shield Activity Monitor Gains Transaction Security Feature
Salesforce.com has bolstered Salesforce Shield, its network activity monitoring system, with a new Transaction Security feature that keeps track of who is authorized to...
WSO2 Launches New Microservices Framework for Java
Integration middleware provider WSO2 has announced a new Microservices Framework for Java (MS4J) to help developers build microservices in Java that support container-based deployments.The...
Oculus Founder Knocks Apple Mac’s Power to Run Virtual Reality Apps
Today's topics include Oculus' founder disses Apple over the power of its computers to run virtual reality, Apple provides technical support via Twitter for...
What to Do After Discovering a Breach at Your Organization
At some point in every breach investigation, the IT person or executive who has responsibility for an organization's security will need to take a...