corporate issues - News, Features, and Slideshows
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
By Ellen Messmer | 07 May, 2014 06:36
New Hampshire-based Infrastructure-as-a-Service company Dyn announced today that it would purchase managed DNS provider Nettica. Terms were not disclosed.
By Jon Gold | 26 March, 2014 13:13
Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
By John Dix | 11 February, 2013 11:55
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
By Bob Brown | 08 November, 2012 20:53
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
By David Strom | 14 November, 2008 10:26
With the economy struggling and financial markets in a state of chaos, this is becoming a hard time to be an IT manager.
By Patrick Thibodeau | 23 October, 2008 09:39
Whitepapers about corporate issues
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
Mobile devices present a unique dilemma to the enterprise. On the one hand, workers empowered with tablets and smartphones can transform the way they do business; they’re more agile, closer to customers and more productive. Bring Your Own Device (BYOD) programs give users the freedom to work on the devices of their own choosing, while still allowing an enterprise to reap the productivity benefits of these always connected, readily accessible mobile devices.
- GoogleX to circle the Earth with Internet-connected balloons
- Ray Ozzie's Talko app stores calls in cloud, lets you search them
- Without mandatory signups, is Google+ adrift?
- Microsoft streamlines free Office for students deal
- Apple iOS 8 fixes outlined in report
- Dell's PC, tablet innovations draw attention
- Smaller Windows PC makers nip at Apple's heels in customer satisfaction
- We just might put a dent in data breaches
- EU tells Google to make more concessions or face charges in antitrust dispute
- Apple outsmarts the thieves
- j2 Global acquires Web24 Group for undisclosed sum
- Lyft acquires ride-sharing startup Hitch
- TasWater archives to deal with data deluge
- Telstra plans hook up to Equinix Australian data centres
- In Pictures: The wild world of workplace wearables