Calpine, an independent power producer with 102 sites across the country, is required to conduct network compliance audits for regulators. Nearly a year ago,...
As phishing scams escalate and mature, its getting tougher for consumers to sort out legitimate e-mails from frauds.Users accustomed to such scams have resorted...
Technology and crime are uneasy partners. As hackers, crackers and sundry cyber-attackers prove almost daily, turning technology into a tool of crime is a...
Many storage vendors have a great deal riding on the success of Serial Attached SCSI, with most incorporating the burgeoning technology into current and...
If youve been following the latest developments in Web publishing, design and development, then youve certainly heard about "Web 2.0."Its a term that is,...
BOSTON—Executives and market watchers surveying the VOIP (voice over IP) space insist that integrated communications applications will drive future adoption of the technology among...
The threats posed by voice over IP networks have been well-publicized, but enterprise IT managers should be just as concerned about attacks that originate...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...