corporate issues - News, Features, and Slideshows
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
By Ellen Messmer | 07 May, 2014 06:36
New Hampshire-based Infrastructure-as-a-Service company Dyn announced today that it would purchase managed DNS provider Nettica. Terms were not disclosed.
By Jon Gold | 26 March, 2014 13:13
Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
By John Dix | 11 February, 2013 11:55
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
By Bob Brown | 08 November, 2012 20:53
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
By David Strom | 14 November, 2008 10:26
With the economy struggling and financial markets in a state of chaos, this is becoming a hard time to be an IT manager.
By Patrick Thibodeau | 23 October, 2008 09:39
Whitepapers about corporate issues
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTDigital Marketing CoordinatorNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTDigital Performance Manager - MediaNSW
- FTSenior SEO ManagerNSW
- FTAccount Manager - DataNSW
- FTStudio Design ManagerVIC
- FTClient Service Director - Search: SEO & PPCNSW
- FTChief Information Officer - CSIROACT
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
- What you should know about Lenovo's Motorola acquisition
- Sencha melds desktop and smartphone management with Space
- Sorry movie goers, Google Glass, other wearables banned from cinemas
- Drupal: If you weren't quick to patch, assume your site was hacked
- After rocket explosion, no air, water pollutants detected
- Microsoft releases stopgap POODLE protection for Internet Explorer
- Smartphone share of overall mobile phone sales stalling at 70 percent
- Pirate Bay co-founder found guilty of hacking in Denmark
- Apple Pay rival MCX defends security after hackers steal emails
- Germany backs plan to retain personal flight data across EU
- Startup Capriza scores $27M to Zapp legacy apps into mobile ones
- China: Facebook not banned, but must follow the rules
- Google AI project apes memory, programs (sort of) like a human
- Nintendo targets new health business with sleep sensor
- Vodafone asks how data retention applies to M2M