TOP STORIES - May 4, 2009 | | | | | Windows 7 Compatibility Issues May Mar Enterprise Adoption eWEEK Labs' early tests of Windows 7 RC 1 show that the OS installs and runs quickly and efficiently; is highly polished for this stage of development; already supports a wide array of hardware; and is obviously rich with security, connectivity and usability features when compared with either Vista or XP. However, Microsoft's method for dealing with application compatibility--Windows XP Mode for Windows 7, or XPM--leaves something to be desired. READ MORE >> Sun Solaris 10 Updates Focus on Virtualization, Security Sun is rolling out the latest update to Solaris 10 with enhancements to Solaris Containers, tighter integration with IPSec and upgrades to its Logical Domains technology. READ MORE >> Brought to you by Ziff Davis Enterprise Breaking Tech News On-the-Go! For the most up to date technology news from our knowledgeable and trusted editors, visit eWEEK mobile from your handheld device. Go to mobile.eweek.com. | | Facebook Targeted in Spam Scam The popular social networking site successfully fights off phishing scams as it announces the selection of brand protection firm MarkMonitor to help it bolster in-house security efforts. READ MORE >> New Seagate Desktop Drive Plugs in, Backs Up The Replica appliance from Seagate Technology safeguards applications, operating systems and all other data, without any human intervention. READ MORE >> Intel Dominates a Declining x86 Processor Market The chipmaker continues to dominate the world's x86 microprocessor market, which suffered a 9 percent year-over-year decline, according to Mercury Research. READ MORE >> | |  | Protecting Data on Laptops: Why Encryption Isn't Enough The increased use of laptops has fueled an unprecedented number of public data breaches. Read this white paper to learn how organizations can track the location and activity of computers off the LAN in near real-time to restrict data access beyond encryption and safeguard against insider threats and user carelessness. DOWNLOAD NOW >> Threat Control and Containment While remote workers, mobile users and road warriors have the firm's best interest in mind when it comes to network security, accidents happen. The ability to effectively protect corporate data is essential to threat control and containment and reducing the risk of costly data breaches. Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. DOWNLOAD NOW >> | | |  | | | |
No comments:
Post a Comment
Keep a civil tongue.