Fujitsu’s 40 Gbps interfaces for its FLASHWAVE 7500 ROADM
Fujitsu Network Communications announced the availability of second-generation 40 Gbps interfaces for its FLASHWAVE 7500 Reconfigurable Optical Add/Drop Multiplexer (ROADM). …
Fedora 11 is now available
Fedora is a Linux-based operating system that showcases the latest in free and open source software. Fedora is always free for anyone to use, modify, and distribute. Fedora 11 …
TweetGrade: online user reputation on Twitter
Purewire launched TweetGrade, which provides a quantitative assessment of a user’s reach and influence in the Twitter community, and it helps people understand a …
DeviceAnywhere introduces Palm Pre to its developer network
DeviceAnywhere added the new Palm Pre phone to its network of 2000+ feature phones and smartphones available over the DeviceAnywhere platform and accessible by organizations …
New book: “The Twitter Book”
Given the intense media spotlight shining on Twitter right now, chances are if you haven’t twittered yet, you’re probably considering it. So what is Twitter? Why …
Netbook privacy filter from 3M
3M announced a new range of privacy filters specifically designed for the netbook market. New Vikuiti Netbook Filters from 3M, initially available to fit 8.9″ and …
First iPhone WLAN management application
E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …
Kerberos 5 Release 1.7 is now available
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …
Event-based forensics on wireless LANs
E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …
Gartner survey shows worldwide IT budgets to decline 4.7 percent this year
In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …
Network security strategy from McAfee
McAfee outlined details of its network security strategy which integrates McAfee’s complete network security suite, including network firewalls, intrusion prevention …
East European ATM sniffing down to poor code auditing
Reports that malicious hackers have developed a range of data-sniffing and stealing trojans that have skimmed cardholder data from Eastern European ATMs since the end of 2007 …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage