1 in 5 Windows PCs still hackable by Conficker Although the media blitz about the Conficker worm prompted a significant number of enterprise users to finally fix a six-month-old Windows bug, about 1 in 5 business computers still lack the patch, a security company said Monday. Twitter wrestles with fourth worm attack Another worm attack early Monday on Twitter kept the micro-blogging Web service chasing down infected accounts and deleting rogue tweets. Cloud computing is a scary proposition Mathias: I'm probably the biggest proponent of Web services/cloud computing/whatever on the planet, because such - in theory, anyway - is the ideal platform for mobile computing going forward. And yet, I'm troubled: there are enough holes in this concept at present to give even rabid supporters pause. Botlab keeping an eye on spamming botnets University of Washington researchers have developed a prototype system called Botlab that monitors botnets to gain insight into a major generator of spam. EMC’s new Symmetrix array targets virtual data centers EMC is unveiling a new Symmetrix storage array designed to support heavily virtualized data centers with hundreds of petabytes of storage and mass quantities of virtual servers. Taking a stab at open source IP Telephony Izhar: It’s been some time now that I was curious about open source IPTEL. Known in many names but all comes back to the Asterisk mother ship. Since it’s an open source application, it can save the potential customer some money. Palm Pre Could Launch by May 17 Stand back! The Palm Pre - a.k.a. the latest iPhone killer - may launch by May 17, according to several hot rumors. Microsoft targets IE6, IE7 users with browser upgrade Microsoft Corp. will begin pushing Internet Explorer 8 (IE8) to users running the older IE6 and IE7 browsers this week, the company has announced. PCI security rules may require reinforcements The PCI standard, long touted as one of the private sector's strongest attempts to regulate itself on IT security, is increasingly being slammed by critics who claim that the rules aren't doing enough to protect credit and debit card data. Cisco phone takes a ride on Air Force One Cisco Subnet blogger Brad Reese says the company's PR department got an inadvertent boost from The New York Times, which published two photos of a Cisco phone onboard Air Force One. Microsoft promises to reduce prices for cloud WS2008 licenses Microsoft will be bowing to pressure from Amazon and offering a simpler, cheaper Windows cloud hosting licensing deal to Amazon and others, promises Bob Muglia. New Microsoft commercial takes another jab at Apple Microsoft's third commercial in its "Laptop Hunter" series invariably finds these "laptop hunters" taking time out of their shopping experience to stick it to Apple, or more specifically, to Mac users themselves. Buzzblog: Snopes.com gets an "A" from fellow fact checkers FactCheck.org gives Snopes.com a dose of its own medicine and the Internet's best-known BS-detector comes through the exam the picture of good health. As for the charge - widely circulated in a chain e-mail - that Snopes lied about an Obama opponent? That one's DOA. Podcast: Prepping for Tougher Health Data Rules As part of the recent stimulus bill, the HITECH Act will create standard electronic health records for every American by 2014, as well as introduce strict new rules for the protection of these health records. John Linkous from eIQnetworks discusses the components of the act and how IT can start preparing now for the new standards. (10:12) April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. |
No comments:
Post a Comment