Physical security attacks are all the rage these days. Two attacks have been described recently that purport to break the physical security of systems...
When considering a virtual-world deployment, it's important to take the following steps:1. Define your objective. Marketing or consumer-facing applications often demand a service, such...
Ray Sirois, IT manager for water engineering firm Wright-Pierce has a problem with Autodesk's AutoCAD 2008. Sirois took the unusual step of issuing a...
Apple's announcement yesterday that it plans to add support for Microsoft's Exchange groupware server on the iPhone and the iPod Touch devices has gotten...
Prices for disk storage hardware keep slipping downward. Who knows when this trend is going to change?Samsung's and Seagate's assembly factories in the Far...
One by one, Adam Schafer, a system engineer at Bluefire, demonstrated the attacks, rendering the smartphone in front of him defenseless.In the first, he...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...