HomeNetworking

Networking

Fortify Joins Hunt for Java Security Bugs

Fortify Software announced May 15 that it is joining the FindBugs project as a sponsor and is offering its static code analysis technology to...

Intel Aims to Upgrade PCs with Virtual Appliances

Intel is eyeing a plan for using software to boost a PCs ability to fight hackers, talk on the phone and even capture television...

Wield the Shield: How Trustworthy Is Your OS?

Trusted operating systems have been used for some time to lock down the most sensitive of information in the most sensitive of organizations. But...

IBM, Rensselaer Team on Supercomputing Center

IBM, which already has four of the 10 fastest supercomputers in the world, is working with Rensselaer Polytechnic Institute to create the fastest machine...

Survey: SOA In, Vista Out

Service-oriented architecture is the next big thing for CIOs, Oracles back in favor, and Novell is showing slight gains in Linux. Vista, however, is...

When Will Microsoft Be Trusted?

Four years ago, Microsoft laid out an ambitious plan for building an NGSCB (Next-Generation Secure Computing Base). NGSCB was to be a trusted computing...

43 Flaws Fixed in Mac OS X, QuickTime

Apple Computers security update train rumbled into the station late May 11 with fixes for a whopping 43 Mac OS X and QuickTime vulnerabilities. The...

Dell Swims in the Channel

In Labs, Jason Brooks reviews trusted operating systems. In commentary, Peter Coffee asks if AJAX is taking developers down the wrong road, and Spencer...

The Dark Side of the Search Engine Business

A new study by McAfees SiteAdvisor Web ratings finds that sponsored results from some of the biggest names in the search engine business contain...

Cisco Names New Linksys GM

Cisco Systems is continuing the overhaul of its Linksys consumer products division, naming Michael Pocock as the groups new senior vice president and general...