Back in the 80s when New Wave music was all the rave, Novell NetWare reigned supreme over corporate networks. Then along came Microsoft Windows Server NT, which toppled Novell from its throne. Now, in a bid to regain its former glory, Novell is re-architecting its offerings to run in a multiplicity of environments.
Mobile security is a top priority for many businesses that want to offer high-end mobile customer applications. Two-factor security that is convenient and transparent to customers is increasingly seen as the first strategic domino that must fall to conduct mobile business effectively.
In the old film noir tradition, the hard-boiled gumshoe detective hunts his prey in sleazy gin-joints and dark alleys, slapping snitches and dames around to get them to talk. Today
Church groups are starting to use the latest video technology to connect with their communities of faith over the Internet. Bob Adams, president of Christian Growth Solutions, a Toronto-based system integrator, says he is helping churches use the technology to reach their flocks
The flaw affects systems running Windows - from 98 through XP. It allows malicious code to be inserted into graphics images, which then infects the target computer when the image is viewed.
Dealing with spam can be quite a daunting task.rnrnWhile spam filters are a common antidote there's always the risk of legitimate e-mails getting deleted along with the spurious and...
IBM iron still seems to be the preferred choice over client-server farms for some businesses with huge volumes of information to crunch fast. It was what 407 Express Toll Route (ETR)