Botnets identified and blocked with new hosted service
A security tool that identifies botnets and blocks attacks from these zombie networks is being made available by Trend Micro online in the software-as-a-service model.
A security tool that identifies botnets and blocks attacks from these zombie networks is being made available by Trend Micro online in the software-as-a-service model.
IBM wants employees who work in Second Life and other virtual online worlds to be on their best behaviour.
Facebook founder Mark Zuckerberg will defend against copyright-infringement allegations on Wednesday, when his lawyers ask a judge to dismiss a complaint filed by three former classmates of Zuckerberg who say he stole the idea for the social-networking site while they attended Harvard University.
In today's information-heavy world, a <a href="http://www.networkworld.com/topics/backup-recovery.html">disaster wiping out a business's data</a> can be fatal for a company. But with the right preparation, a business can survive natural disasters, power outages or even terrorist attacks.
Warnings from analysts that the iPhone is not suitable for businesses are not stopping one CRM vendor from porting its product onto Apple's popular consumer device.
A product recently released by speech analytic software vendor Nexidia assesses the spoken language skills of call centre employees, helping businesses make sure customers can understand customer service representatives.
Real-time maps showing the "health" of the Internet, including its speed, traffic numbers and the rate of attacks, are now freely available to the public from <a href="http://www.akamai.com/visualize"target="_blank">Akamai</a>, which operates a distributed computing platform that handles much of the world's Web traffic.
IBM is using a variety of green technologies for a US$86 million (NZ$112 million) datacentre expansion in Boulder, Colorado, that will be the company's largest datacentre in the world.
<a href="http://www.networkworld.com/news/financial/ibm.html">IBM</a> says it has nearly tripled the performance of the technology behind the world's fastest and most energy-efficient supercomputer, developing a system that is potentially 100,000 times more powerful than a home computer. It will be used by the <a href="http://www.networkworld.com/news/2006/090706-ibm-will-build-new-department.html">U.S. Department of Energy</a> and the <a href="http://www.mpg.de/english/aboutTheSociety/index.html">Max Planck Society for the Advancement of Science</a>.
Pillar Data Systems, the storage vendor funded by Oracle CEO Larry Ellison, is planning to release new features designed to help businesses avoid wasting storage space. The technology behind the upcoming release is called thin provisioning.
The analyst firm <a href="http://www.gartner.com/">Gartner</a> will tell IT executives to keep <a href="http://www.networkworld.com/news/2007/051707-fcc-approves.html">Apple's iPhone</a> away from their networks, in a research report to be released within a week.
CIOs and IT managers should prepare to spend more time in the boardroom and on the road with marketing executives, because increasing amounts of digital information, extra security requirements and tighter integration with the business are changing the way they need to approach their jobs.
A new type of image spam found this week is able to bypass many filters by presenting a message as wallpaper within an email, according to the vendor Secure Computing.
Google is expanding seemingly by the minute, and acquisitions are playing a big role in its quest to rule the technology world. Earlier this month, Google said it plans to buy a photo-sharing website called Panoramio and confirmed the acquisition of security software vendor GreenBorder Technologies.
<a href="http://www.networkworld.com/news/financial/google.html">Google</a> Wednesday introduced an open source technology for <a href="http://www.networkworld.com/topics/webservices.html">building Web applications</a> that continue to work even after a user's Internet connection is disabled.