HomeLatest News

Latest News

10 Things Chrome OS Needs to Break into the Enterprise

Reports are suggesting that Google Chrome OS for enterprise users will be available in 2011. Google has yet to make a definitive statement on...

IDC Unveils PC Market Predictions for 2010

IDC released its 2010 predictions for the PC market, and the analyst firm says virtual desktops, WiMax and a return to desktops are in...

Avaya Introduces UC Solution IP Office 6.0

Unified communications specialst Avaya announced the release of IP Office 6.0, a UC solution offering collaboration tools such as voice, instant messaging, presence and...

IceWeb Offers Iplicity Data Storage Platform

Storage solutions and online cloud computing application services provider IceWeb announced the launch of its Iplicity Data Storage platform, which enables the incorporation of...

IT Career Advice: Questions for a Technology Career Expert, Part 2

The following is Part 2 of a question-and-answer session with technology-career author Janice Weinberg. Weinberg is a former IBM system programmer and a General...

IT Career Advice: Questions for a Technology Career Expert, Part 1

Janice Weinberg is a former IBM system programmer and a General Electric faculty member at the Management Development Institute, and currently runs the career-services...

Microsoft Plans Office 2010 Release in May for Businesses

Businesses will be able to purchase the full version of Office 2010 May 12, roughly a month before consumers get their hands on Microsoft's...

How to Reduce Security Risks Associated with Storing Credit Card Data

Companies that follow best practices in data security have a risk assessment program. As outlined by the United States General Accounting Office (GAO), risk...

Google Buzz, Latitude May Be Integrated, Google Says

Google will try different points of integration between Google Latitude and the new Google Buzz for mobile application, a product manager for the company...

Cloud Computings 7 Deadliest Security Risks

Cloud Computings 7 Deadliest Security Risks by Brian Prince Abuse and Nefarious Use of the Cloud IAAS (infrastructure-as-a-service) providers are open to abuse with lenient registration processes,...