corporate issues - News, Features, and Slideshows
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
By Ellen Messmer | 07 May, 2014 06:36
New Hampshire-based Infrastructure-as-a-Service company Dyn announced today that it would purchase managed DNS provider Nettica. Terms were not disclosed.
By Jon Gold | 26 March, 2014 13:13
Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
By John Dix | 11 February, 2013 11:55
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
By Bob Brown | 08 November, 2012 20:53
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
By David Strom | 14 November, 2008 10:26
With the economy struggling and financial markets in a state of chaos, this is becoming a hard time to be an IT manager.
By Patrick Thibodeau | 23 October, 2008 09:39
Whitepapers about corporate issues
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCAutomation QAVIC
- CCCisco Network EngineerNSW
- FTSenior Project Manager - SecurityNSW
- FTSOE EngineerQLD
- CCSolution Architect - Biomedical - South Australia locationSA
- FTJava or Ruby Web DeveloperVIC
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- FTAndroid DeveloperNSW
- FTFull Stack & Mobile EngineersNSW
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160205/AP/541Asia
- CCWintel Support EngineerNSW
- CCContract Analyst Programmer (JAVA/Crystal Report) 160115/AP/vhsAsia
- CCHybris Developer - Global ConsultancyNSW
- FTTechnical Support EngineerNSW
- FTTechnical WriterNSW
- CCAD and FIM EngineerNSW
- FTOracle System Integration Engineer - CANBERRASA
- FTSecurity ArchitectWA
- CCIT Hadoop DevelopersQLD
- CCPython Web Developer - DevOPS EnvironmentVIC
- CCSAP CRM Specialist- ABAPACT
- CCService EngineerVIC
- CCSenior Test AnalystSA
- FTIT Technical LeadVIC
One of the biggest use cases for the cloud – in fact, the biggest, in the case of hosted private cloud – is for backup and disaster recovery. This white paper explores why the Cloud is well suited for Disaster Recovery and what organisations need to consider to ensure that Cloud DR is right for them.
- Flash memory's density surpasses hard drives for first time
- Modular cellphone kit can be used for IoT and wearables
- Dragula looks to take the bite out of drag-and-drop
- Mozilla sets kill date for Firefox OS on phones
- LTE-U’s cold war may be thawing, as field testing commences ahead of summit
- Now that AI has mastered 'Go', are all our jobs next?
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Researcher finds serious flaw in Chromium-based Avast SafeZone browser
- Fed up with bogus computer support calls, man turns tables on scammers
- Dridex banking malware mysteriously hijacked to distribute antivirus program
- SamsaraJS: Famo.us fork juices mobile Web UIs
- How to secure Amazon Web Services like a boss
- UN panel backs WikiLeaks' Julian Assange, but he may not go free
- The Neutrino exploit kit has a new way to detect security researchers
- 7 smartphone trends to watch this year