Tag: 80

Dell talks about 80 core processor 
By Sylvie Barak | Nov 20, 2008 | Comment Now 
Get ready an 80-core monster machine from Dell. At SC08 yesterday, Michael Dell, Dell’s CEO gave a presentation which included a slide showing an 80 core chip which should tip ...
IBM reduces desktop storage needs by 80 per cent 
By Rosalie Marshall | Sep 17, 2008 | Comment Now 
IBM is launching a new product that will help customers manage virtual desktop deployments by reducing storage requirements by up to 80 per cent.
Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches 
By William McKinney | Jan 9, 2008 | Comment Now 
A recent survey of 100 IT managers and CIOs from the financial services, health care, retail, manufacturing and government business sectors shows that despite a torrent of bad ...
Hackers breach money transfer company accessing 80,000 customers  
By Dan Kaplan | Jan 16, 2007 | Comment Now 
A MoneyGram International server has been breached, allowing cybercrooks access to the personal information of nearly 80,000 people.
Study: Email-borne malware successfully hit 80 percent of businesses 
By Dan Kaplan | Jul 25, 2006 | Comment Now 
Multiple variants of malware carried through emails have successfully entered more than eight out of 10 businesses, a new report shows.
HP claims its photo paper lasts 80 years 
By Tim Smith | Jul 4, 2006 | Comment Now 
HP has criticised the quality of third-party inkjet printer inks and papers, saying that they cannot match the quality or longevity of its own products.
Report: 80 percent of emails out to manipulate 
By Dan Kaplan | Mar 10, 2006 | Comment Now 
Four out of five inbound emails are designed to deceive the recipient, according to a new report studying the scope of abusive online messages.
Clothing firm saves 80 per cent on IT costs 
By Dan Ilett | May 18, 2004 | Comment Now 
A mail order clothing firm has saved 80 per cent on IT support and management from implementing an all-in-one security solution.
Sign up to receive iTnews email bulletins
Latest Comments
In which area is your IT shop hiring the most staff?

   |   View results
IT security and risk
Sourcing and strategy
IT infrastructure (servers, storage, networking)
End user computing (desktops, mobiles, apps)
Software development

Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results