When the IEEE ratified the 802.11i Wireless LAN security standard and the Wi-Fi Alliance subsequently began certifying a subset of 802.11i called WPA2, it...
TelecomVonages IPO folliesFirst, Vonage pitches its IPO to its customers. Nice idea—at least on paper. Then customers take Vonage up on its offer to...
The WAN acceleration market is saturated, and I expect to see consolidation in the near future. Even so, after inviting several WAN acceleration vendors...
Microsoft security researchers have used data collected from the companys Malicious Software Removal Tool, or MSRT, to produce the clearest picture yet of the...
Development platforms are set to take center stage at Microsofts annual TechEd conference June 11-16 in Boston.
Microsoft is expected to talk up new and...
Fulfilling eWEEK Labs prediction that patch management systems would morph into more widely focused asset lifecycle management solutions that address both enterprise security and...
Data management software maker CommVault announced an advance in its data recovery management software June 12 with the availability of new features for the...
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...