TOP STORY: New high-speed I/O interface debuts at CES The war is over and USB has won... or has it? At CES this week a new wireless SATA interface will try to dethrone SuperSpeed USB by offering speeds of up to 6Gbps vs. USB 3.0's max of 5Gbps. Read More WHITE PAPER: Buyers Guide to Data Loss Prevention Solutions (Websense, Inc.) This guide provides a list of recommended features and capabilities for buyers to consider when purchasing a DLP solution. Buyers can also use this guide to develop requests for proposals, as well as to help differentiate one vendor's products from another during demonstrations and proof-of-concepts. Read More | Motorola splits into Droid, wireless gear divisions Motorola is taking a big gamble that its popular Droid smartphones will continue to thrive even if Verizon Wireless the major seller of Droids starts hawking iPhones, too. Read More HP announces Fusion netbook with LTE Hewlett-Packard on Tuesday announced a netbook with some cutting-edge mobile broadband and graphics technologies that could make it the most powerful netbook yet. Read More WHITE PAPER: Yankee Group: Accelerate UC Deployments (Level 3) Unified Communications holds tremendous promise, but deployments have fallen short of the hype. This Yankee Group report analyzes the reasons behind the gap between the UC vision and deployment such as sticking with a TDM network architecture instead of IP. Yankee discusses the value of SIP trunking and offers a SIP trunking vendor checklist. Read More | Opera previews browser for tablets Norwegian company Opera Software will unveil the first public preview of its browser for tablets at the International Consumer Electronics Show (CES), it said on Monday. Read More Road warrior roadkill: 2010's mobile technology losers The iPad revolutionized the tablet and Android showed the iPhone isn't invincible, but these products showed the road to the mobile future has also claimed many victims. Read More WHITE PAPER: Remote Office Security (PacketMotion) This white paper covers how PacketSentry's distributed architecture makes it easy to apply security controls in international offices so that central IT Security staff can quickly and effectively mitigate many of these risks, without depending on remote IT staff or log sources. Read now! | CES 2011: The Madness Begins Later today I will board a plane for Las Vegas to attend the 2011 Consumer Electronics Show (CES), but the madness of gadget reports are already beginning. Read More Man vs. machine at CES 2011 With CES 2011 upon us, I can't help but reflect on the doggedness of the mobile industry to package wireless calling, computing, emailing, gaming, streaming and dozens of other functions into just the right form factors. Read More WHITE PAPER: Top 5 Tasks to Automate (LogMeIn) Make routine maintenance truly routine. See how to create, schedule and roll-out repetitive, tedious IT support tasks. From defrag analysis or deploying network drive and printer mapping scripts, to software installations and patch deployments, LogMeIn can improve the way you monitor, access and maintain remote clients. Read now. | Good times projected for network security market in 2011 There's some early optimism about the information technology industry as the world steps into 2011. For one thing, the global network security market is expected to be on the rise, according to estimates from IDC, which forecasts a return to the growth of pre-recession levels this year. Read More Dell buys SecureWorks for IT security services Dell announced Tuesday it is purchasing security services vendor SecureWorks, expanding its range of IT management offerings. Terms were not disclosed. Read More US begins sophisticated wireless jamming project Looking to begin developing algorithms and other technology to automatically learn to jam certain new wireless transmissions that may threaten US military personnel. Read More Geinimi Android malware has 'botnet-like' capabilities Lookout Mobile Security warned that it identified a new Android Trojan named Geinimi that is built to lift and transmit personal data from a user's phone and ship it to a remote server. Read More |
No comments:
Post a Comment