corporate issues - News, Features, and Slideshows
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
By Ellen Messmer | 07 May, 2014 06:36
New Hampshire-based Infrastructure-as-a-Service company Dyn announced today that it would purchase managed DNS provider Nettica. Terms were not disclosed.
By Jon Gold | 26 March, 2014 13:13
Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
By John Dix | 11 February, 2013 11:55
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
By Bob Brown | 08 November, 2012 20:53
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
By David Strom | 14 November, 2008 10:26
With the economy struggling and financial markets in a state of chaos, this is becoming a hard time to be an IT manager.
By Patrick Thibodeau | 23 October, 2008 09:39
Whitepapers about corporate issues
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- CC.Net Solution ArchitectNSW
- CCSenior Systems EngineerNSW
- CCDBA (Oracle/SQL)NSW
- CCMobile Designer / Developer - IOSNSW
- FTSenior SQL DBANSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- FT.Net Solution ArchitectNSW
- CCMobile Designer / Developer - IOSNSW
- CCMobile iOS DeveloperNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
For the foreseeable future, a two-tier DDoS protection architecture should continue to provide the flexibility and manageability that today’s architects need to combat the modern DDoS threat. This recommended DDoS protection reference architecture leverages F5’s long experience combatting DDoS attacks with its customers. •Learn the four categories of DDoS threats and the recommended mitigation architectures •Answer why you should consider a cloud based scrubbing service and how to choose one •Understand the benefits to a multi-tier DDoS protection architecture
- Microsoft hosts Office 365 in Australia
- NBN Co launches FTTB offering
- Security snafu as G20 leaders' passport details leaked
- US trade body to investigate Apple after Ericsson complaints
- In Pictures: The things end users do that drive IT teams crazy
- Sprint to rollout LTE Advanced to Chicago area
- Microsoft applies 'freemium' tactic to mobile device management for Office 365
- Researchers say low-cost, longer-life graphene light bulb coming this year
- With Tidal relaunch, Jay Z doubles down on streaming for audiophiles
- China considering space-based solar power station
- Silk Road investigators charged with stealing bitcoin
- HP links Vertica and IDOL seeking better unstructured data analysis
- SDN management battle: TAPs vs. network packet brokers
- Google integrates Now with Chrome OS's app launcher
- Smartwatch shipments to catapult by 500% in 2015 on interest in Apple Watch