computing

E-paper heralds computing revolution

E-paper heralds computing revolution

Roll up, roll up, roll up for a new computing era.
Robert Jaques Jan 10 2007 9:26AM Hardware
Emerging markets embrace 64-bit computing

Emerging markets embrace 64-bit computing

Strong interest from eastern Europe, Brazil, China and India.
Clement James Sep 21 2006 9:58AM Hardware
Telstra makes Good on mobility computing

Telstra makes Good on mobility computing

Telstra has partnered with US-based Good Technology to take its mobile computing software and services to the government and enterprise markets.
Tim Lohman Jul 13 2006 1:41PM Telco/ISP
Secure Computing and CipherTrust merge in $273.6 million deal

Secure Computing and CipherTrust merge in $273.6 million deal

Secure Computing announced Tuesday that it is purchasing CipherTrust for total consideration of $273.6 million.
Ericka Chickowski Jul 12 2006 1:02AM Security
Finjan sues Secure Computing, accusing patent infringement

Finjan sues Secure Computing, accusing patent infringement

Web security vendor Finjan Software has filed a lawsuit against Secure Computing, accusing its competitor of patent infringement.
Dan Kaplan Jun 6 2006 10:34PM Security
Secure Computing buys CyberGuard

Secure Computing buys CyberGuard

Secure Computing has reached an agreement to buy rival CyberGuard for nearly $300 million. The move is the latest in a trend of consolidation in the IT security market.
René Millman Aug 18 2005 3:24PM Security
Directors urged to go quantum

Directors urged to go quantum

Some of Australia's leading company directors are being urged to take advantage of opportunities in quantum computing.
Staff Writers May 13 2005 1:00PM Hardware
Trusted computing for all and not the few

Trusted computing for all and not the few

Trusted computing initiatives are a must but need to be fair to all parties before it can be accepted, a security expert said in the opening keynote speech of the ISSE/ICCC conference in Berlin.
René Millman Sep 28 2004 2:45PM Security
CyberGuard calls off bid for Secure Computing

CyberGuard calls off bid for Secure Computing

CyberGuard announced Monday that it is no longer pursuing its offer to acquire Secure Computing.
Marcia Savage Aug 10 2004 9:20PM Security
Users confused about utility computing: IDC

Users confused about utility computing: IDC

Staff Writers Jul 29 2004 12:00AM Storage
Secure Computing snubs CyberGuard

Secure Computing snubs CyberGuard

Secure Computing Corporation has rejected CyberGuard’s $297 million bid to buy the company.
Dan Ilett Jul 15 2004 5:08PM Security
CyberGuard bids for Secure Computing

CyberGuard bids for Secure Computing

Security giant CyberGuard is set to spend an estimated $297 million on acquiring U.S. based firm Secure Computing Corporation.
Dan Ilett Jul 12 2004 2:00PM Security
Trustworthy Computing must include browsers

Trustworthy Computing must include browsers

What is Microsoft thinking of? The company’s laudable goals of Trustworthy Computing have seen great strides made in much of its software, its patching process is improving and security-specific products like ISA Server are getting steadily better. But the firm seems to be having huge difficulty fixing fundamental flaws in Internet Explorer, flaws that are being actively exploited by criminals, and is now considering abandoning standards in what appear to be increasingly desperate attempts to secure the browser.
Jon Tullett Feb 12 2004 5:42PM Security
Trustworthy Computing?

Trustworthy Computing?

The fundamental basis for any kind of relationship is trust: the difficulty lies in attaining it.
Illena Armstrong Jan 19 2004 9:44AM Security
Security Threats of Pervasive Computing

Security Threats of Pervasive Computing

Remember when we had telephone booths on every street corner?
Dave Lang Jan 19 2004 9:41AM Security
Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection

Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection

We live in a new era of blended threats, worm viruses and a host of new breeds of malicious mobile code that are more dangerous than ever.
Dean Coza Jan 15 2004 11:22AM Security
Handheld Computing Power: A Two-Edged Sword

Handheld Computing Power: A Two-Edged Sword

It’s two a.m. Do you know where your corporate data is?
Joan Herbig Jan 12 2004 3:06PM Security
Waking Up to Reality: Security and Handheld Computing Devices

Waking Up to Reality: Security and Handheld Computing Devices

Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey Jan 12 2004 2:04PM Security
Future Challenges in Pervasive Computing Environments

Future Challenges in Pervasive Computing Environments

What is the pervasive computing paradigm?
Sadie Creese Jan 12 2004 1:37PM Security
CA talks up on-demand computing

CA talks up on-demand computing

Siobhan Chapman Jan 1 2000 12:00AM Security

Log In

  |  Forgot your password?