While Microsoft beats the drum loudly for Vista, the K Desktop Environment open-source community has more quietly been improving its popular desktop interface.
The upcoming...
Members of the Foreign Relations Committee of the U.S. Senate on Tuesday approved a treaty addressing cyber-crime, prompting criticism from civil liberties groups that...
A security flaw has been discovered in the Internet Graphics Server application in SAP R/3 that could allow unauthenticated access to files.
Security alerts aggregator...
Microsoft Corp. is tightening the noose for those people running illegal or pirated copies of its Windows XP Professional, Windows XP Home, Windows XP...
LAS VEGAS—Rootkits. Zero-day exploits. Social engineering. Encryption cracking. Cryptography. File format fuzzing. Kernel exploitation.
These are just some of the buzzwords making the rounds at...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...