As mobile users transition to 4G LTE handsets, they will increasingly bring those devices into enterprises through BYOD. This is expected to fuel increased spending on technologies to integrate LTE handsets and services, such as voice-over-LTE, into the corporate network.
As in Michael Crichton's best-selling novel the Andromeda Strain, an epidemic is raging on planet Earth. This time, it's not a microorganism attacking the blood stream that is the problem, but malicious software attacking corporate networks.
IT professionals are increasingly concerned about the security risks posed by personal mobile devices in the workplace, particularly the introduction of malware into the corporate network.
The greatest number of transactions the network has had to accommodate at once is 12,000, however, leaving plenty of extra capacity for innovation work.
Intel (NASDAQ: INTC) is giving away Open FCoE, a software stack for Intel's 10 Gigabit Ethernet Server Adapter X520 family that makes it possible to run Fibre Channel over standard Ethernet networks.
A radiology center in New Hampshire suffered a data breach in November, exposing the social security numbers and other personal data of 230,000 people. The culprits, according to Seacoast Radiology,
Security risks abound even in organizations that take important steps to mitigate them. Sometimes they appear right under one's nose, and other times they can be quite obscure. ComputerWorld's John
It has emerged that malware loaded onto a USB flash drive led to the worst U.S. military breach ever. And though the recently declassified event took place some two years back, it probably comes as
Last week we pointed out a report from the Corporate Executive Board that predicts the state of corporate IT in the year 2015. The report (.pdf) looks at today's IT function in light of developments
A glance at two major IT news items over the past week is enough to make one wonder if large organizations have much control over their networks anymore: A faulty anti-virus update sent out by