corporate issues - News, Features, and Slideshows
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter.
By Ellen Messmer | 07 May, 2014 06:36
New Hampshire-based Infrastructure-as-a-Service company Dyn announced today that it would purchase managed DNS provider Nettica. Terms were not disclosed.
By Jon Gold | 26 March, 2014 13:13
Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
By John Dix | 11 February, 2013 11:55
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
By Bob Brown | 08 November, 2012 20:53
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
By David Strom | 14 November, 2008 10:26
With the economy struggling and financial markets in a state of chaos, this is becoming a hard time to be an IT manager.
By Patrick Thibodeau | 23 October, 2008 09:39
Whitepapers about corporate issues
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
Security and convenience should not be a zero-sum game. Security must not block progress to transform businesses. Likewise, mobile collaboration presents a tremendous opportunity for businesses. Read this paper to understand the five primary threats and how to both address risks and gain process efficiencies through secure mobility.
- Apple's Black Friday sale includes iPhone for the first time
- France, Germany want EU to take a tougher stance on tech firms
- Coming soon: Murder by Internet
- Distracted? Slap this Hitachi gizmo on your forehead to focus
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
- Sony confirms development of e-paper smartwatch
- Sydney Startup Weekend doubles attendance in one year
- ASIC unhappy with exclusion from data retention regime
- Australian Internet Security Initiative portal launched to help ISPs
- How SBS scaled up for FIFA World Cup online
- Hail pounds telecom networks in Queensland
- RMIT University builds virtual networking labs for students
- Weather.com fixes web application vulnerabilities
- Early version of new POS malware family spotted
- Syrian Electronic Army posts hacking message on several news sites