101,425 Results for:

  • Sort by: 

Intel cancels 2GHz Xeon

20 Sep 2001

Intel has decided not to launch the expected 2GHz version of its Xeon processor for dual-processor servers this year, opting to... Read More

Let computers make the decisions

05 Sep 2001

Intel is working on ways to enable computers to anticipate user needs and act on their behalf - a move that could help companies... Read More

White Paper: Software solutions for effective network power management

21 Oct 1999

Uncertain power conditions can wreak havoc on small businesses, however, there are ways to limit the risk of computer data loss Read More

Case Study: ProLiant servers by Compaq

24 Oct 1999

Building a gas pipeline connecting Britain and the continent proved to be an enormous task, but it’s proved to be a project built... Read More

Firefox security issues persist despite update

By Bill Brenner 05 Sep 2007

Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes. Read More

Cybercriminals employ toolkits in rising numbers to steal data

By Robert Westervelt 07 Sep 2007

The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Read More

Critical flaw discovered in IBM DB2

05 Sep 2007

IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system. Read More

Government warns of dangerous QuickBooks Online flaw

By Bill Brenner 07 Sep 2007

Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned. Read More

Home Office waits for police database case

By Lindsay Clark 21 Mar 2005

Second Bichard report reveals concerns about a lack of progress and buy-in from forces around England and Wales for the national... Read More

Lifting the lid on secret stiffing techniques

24 May 2000

One of the UK's most experienced IT negotiators lifts the lid on some of the sharp practices used by software suppliers to get... Read More