Court Ruling Tilts toward VoIP Providers
A ruling on a little-watched case in Texas is first to challenge RBOCs' right to charge access fees.
A ruling on a little-watched case in Texas is first to challenge RBOCs' right to charge access fees.
The FCC's Julius Knapp outlined the agency's ambitious plans to open the airways to broadband, with key decisions due on or before Oct. 1.
"Proven Solutions" aims to settle CIO concerns about risk and ROI as they move to private clouds.
Security and virtualization can be a challenge, but a report says managing the challenge well reaps additional rewards.
A study shows even accidental breaches can do a lot of damage.
A new report delivers best practices on dealing with this spam vector.
Too many IT managers are mired in minutiae, fixing small holes while failing to see the big issues, Cisco said today.
Key drives pose malware propagation risk, and the damage isn't limited to desktop PCs.
With so many companies large and small targeting the cloud, the providers of cloud management tools expect to defeat vendors of targeted apps.
Dasient's answer is to crawl the Web looking for vulnerabilities, analyze the vulnerabilities it finds, and deliver signatures of those vulnerabilities to servers it's defending.
Salesforce says the free edition of Force.com will make it easy for companies to build their first cloud application.
Announcements show both that large enterprises are adopting the cloud and that cloud and virtualization ecosystems are thriving.
Database company talks strategic value of the buy; predicts "substantially higher margins" from troubled Sun.
Beyond the talk about "synergies" and innovation may be a simpler motivation: picking off a dogged but weakened competitor.
Can plain vanilla, cost-driven VoIP succeed in today's world?
An emphasis on service and quality and focus on one market are keys to M5 Networks' success.
These are the people who wrote DNS BIND. They helped build the ISOC, ARIN, and the other institutions that keep the internet running. So what they do with nonexistent URLs will not, they promise, do harm.
Nine companies gather up their gear to prove that large and small enterprises can build true storage networks with off-the-shelf equipment. But, only the most distinguished efforts can earn the "Golden Spike."
For those who find it essential to monitor intranet usage and traffic, WebTrends has long been regarded as the best log analysis software for Windows NT and 2000 systems. Having been absorbed by NetIQ in March, they are redefining the way they do business with their latest release.
If you think there is no way conventional anti-virus applications can stop the sprawl of e-mail contagions such as SirCam -- you're right, which is why MessageLabs took its high-end virus-stopping solution to the Net.
When operations get really big, it's time to toss aside written records and develop a real network management tool. Enter EDGE IP from Threshold Networks -- automating the process of DNS management and device tracking.