Matt Hines

Lucent Pushes Convergence Techs with Sun

Networking gear maker Lucent Technologies and Sun Microsystems announced a new partnership through which the firms said they will develop technologies meant to reduce complexity for business customers of converged wireless and landline communications services. Introduced at the ongoing CTIA Wireless 2006 convention in Las Vegas, the companies said they will specifically address mobile applications […]

Nokia Pitches Device Management

IT administrators are already struggling to support the glut of new wireless applications and devices being adopted within their organizations, and will increasingly look to adopt management services that help support all these tools, according to handset maker Nokia. As a result, the company launched a new device management package at the CTIA Wireless convention […]

Computer Sciences to Restructure

Computer Sciences Corp. announced that it will undergo major internal restructuring over the next year, even as the companys directors consider potential buyout offers from Wall Street. CSC Chairman Van Honeycutt detailed the plans in a statement, saying that the restructuring program will be aimed squarely at streamlining the IT services giants worldwide operations, and […]

Security Worries Hang Up Mobile Plans

New research indicates that many companies are putting a hold on the introduction of new wireless technologies based on concerns over IT security. Published by security applications maker Symantec and the research arm of UK-based newsmaker The Economist, the survey contends that the threat of virus attacks, potential flaws in smart phone software and a […]

McAfee Touts New Integrated Approach

Software maker McAfee is changing the way it sells and markets its security applications to emphasize the integration built into the products and address customers increasing desire for unified defense management tools. Introduced under the name Total Protection, McAfee will begin selling its anti-malware and intrusion detection applications in four individual packages aimed at companies […]

Symantec Makes New Bid to Secure IM

Security software maker Symantec is hoping to cash in on enterprise customers growing headaches around managing and protecting instant messaging applications, including the freely available IM clients so popular among todays users. While corporate messaging systems made by companies including Microsoft and IBM have long been pitched as the best answer to security issues raised […]

Company Touts Low-Cost Facial Recognition

Security experts have long predicted that personal identification technologies such facial recognition software would someday replace passwords in the common business setting, and one firm is betting that the availability of cheap, effective hardware, along with its software, is making such systems more practical today. Known as Sensible Vision, the company introduced a new product […]

Convergence and Security Headline CTIA Show

The convergence of wireless services, expansion of the digital footprint in the home and office, and security defenses necessary to protect all those technologies will dominate headlines at next weeks CTIA Wireless Conference in Las Vegas. The Cellular Telecommunications & Internet Associations annual meeting in the desert is expected to draw some 40,000 people into […]

Cell Phone Spy Program Raises Concerns

A program designed to help people spy on their loved ones mobile phone usage is raising concerns among some security experts who say that enterprises need to be on the lookout for the product, which is marketed under the brand name FlexiSpy. Researchers at security applications maker F-Secure issued an alert to customers informing them […]

Registry Aims to Cut Phishing Bait

As businesses continue to struggle with criminals trying to hijack their online content in order to dupe people with so-called phishing schemes, one company has created a directory designed to help firms defend their interests. In response to a security landscape where thousands of new phishing attacks are reported each month, many of which target […]