Sprint is hoping to feed the growing hunger for fast Internet access with the second generation of its Sprint Broadband Direct fixed wireless service.Sprints...
Canonicals Ubuntu 6.06 LTS is an excellent Linux-based operating system—so excellent, in fact, that it not only earned eWEEK Labs Analysts Choice designation but...
Data protection best practices (www.superdlttape.com/Practices/Default.htm)
Resources for crisis/emergency management and business continuity (www.disaster-resource.com/cgi-bin/template.cgi?content_page=articles.htm)
Veritas white papers archive (veritas.com/news/listing/WhitePapersBySection.jhtml?start=101§ion=W&subject=All&entity=Download&subview=getAllDownloadListBySection)
Tips on preparing a disaster recovery plan (www.disasterplan.com/yellowpages/tips.html)
University of...
Prevention
Multivector attacks are becoming increasingly common, increasing security risk. Examples include Nimda (which attacks clients and servers) and sadmind/IIS (which attacks Solaris and Windows).
IIS...
Lancope Inc.s StealthWatch G1 intrusion-detection appliance stands apart from standard signature-based detection products in several important ways. Its Linux-based software uses a unique flow-based...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...