Tags: trsRemove, 80Remove

Dell talks about 80 core processor 
By Sylvie Barak | Nov 20, 2008 | Comment Now 
Get ready an 80-core monster machine from Dell. At SC08 yesterday, Michael Dell, Dell’s CEO gave a presentation which included a slide showing an 80 core chip which should tip ...
IBM reduces desktop storage needs by 80 per cent 
By Rosalie Marshall | Sep 17, 2008 | Comment Now 
IBM is launching a new product that will help customers manage virtual desktop deployments by reducing storage requirements by up to 80 per cent.
Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches 
By William McKinney | Jan 9, 2008 | Comment Now 
A recent survey of 100 IT managers and CIOs from the financial services, health care, retail, manufacturing and government business sectors shows that despite a torrent of bad ...
Hackers breach money transfer company accessing 80,000 customers  
By Dan Kaplan | Jan 16, 2007 | Comment Now 
A MoneyGram International server has been breached, allowing cybercrooks access to the personal information of nearly 80,000 people.
Study: Email-borne malware successfully hit 80 percent of businesses 
By Dan Kaplan | Jul 25, 2006 | Comment Now 
Multiple variants of malware carried through emails have successfully entered more than eight out of 10 businesses, a new report shows.
HP claims its photo paper lasts 80 years 
By Tim Smith | Jul 4, 2006 | Comment Now 
HP has criticised the quality of third-party inkjet printer inks and papers, saying that they cannot match the quality or longevity of its own products.
Report: 80 percent of emails out to manipulate 
By Dan Kaplan | Mar 10, 2006 | Comment Now 
Four out of five inbound emails are designed to deceive the recipient, according to a new report studying the scope of abusive online messages.
Clothing firm saves 80 per cent on IT costs 
By Dan Ilett | May 18, 2004 | Comment Now 
A mail order clothing firm has saved 80 per cent on IT support and management from implementing an all-in-one security solution.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats