Search

Results 1-20 of 64 for Andrew Burger.

HP Targets SMBs With Infrastructure in a Box

HP on Tuesday launched HP Adaptive Infrastructure in a Box for Midsize Businesses, a suite of products and services designed to enable businesses with anywhere from 100 to 999 employees to more efficiently and cost-effectively manage their evolving network and IT needs. The three-tiered HP AI in a B...

The Olympics, Part 2: Gold-Medal Network Performance

Online media coverage of this year's Summer Olympic Games on MSN is shaping up to be a breakout event for Internet TV, as well as quite a big hit for NBC and its tech partners. The network reported 12 million hits and 70 million page views on its Olympics Web site -- and that was before the opening ...

The Olympics, Part 1: A Test of IT Strength, Endurance and Discipline

The 2008 Summer Olympics kicked off in Beijing Friday, and this year's Summer Games will serve up highlights outside of athletic prowess and national pride. China's hosting of this year's Games has made them a flash point for a wide range of issues having to do with China and international relations...

The Road to 4G: WiMax Leads the Way

Gathering momentum and now moving swiftly, a host of companies are progressing with efforts to develop and prove so-called fourth generation, or 4G, wireless technologies. Eagerly anticipated, what exactly constitutes 4G is yet to be determined. Though this process is driven in the main by internati...

OS Implementations: A Guide for SMBs

Though their IT needs are fundamentally the same as larger organizations, small and medium-sized business owners may feel particularly challenged when it comes to rolling out a new operating system. The increasing complexity of IT system architectures combined with a relative shortfall of resources ...

ESET App Girds Smartphones for Malware Battles

Malware has yet to plague smartphones to anywhere near the extent it has PCs, but it's only a matter of time before cyber-criminals start targeting mobile networks. ESET, developer of the NOD32 antivirus solution for PCs and computer networks, is the latest IT security specialist to enter the fray.

New Ransomware Making the Rounds

IT security provider Kaspersky Lab has issued a security alert following the detection of a particularly malicious piece of "ransomware." Kaspersky researchers were the first to detect and issue warnings that a new, stronger version of the Gpcode virus was on the loose. Even though it doesn't appear...

EXCLUSIVE INTERVIEW

ESET’s Randy Abrams: Don’t Let Phishers Hook Your Stimulus Rebate

Botnet operators intent on duping Internet users out of their savings have proved adept at social engineering, taking advantage of breaking news events and direct marketing -- as well as audio and video files and PDF attachments -- to lure people into downloading a variety of malware and visiting sp...

The H-1B Visa Dilemma, Part 2: What to Do?

Part 1 of this two-part series enumerates the ways in which the guest-worker visa program fails to meet the needs of American workers and the high-tech industry. Part 2 digs further into the arguments for and against the H-1B visa program, as well as the trends and motivations underlying them. "Goog...

The H-1B Visa Dilemma, Part 1: A Broken System

The disconnect has never been more pronounced between the supply and demand of H-1B visas, the visa program that allows guest workers in the United States. The technology industry has been at the forefront of the H-1B visa debate, lobbying for the government to allow more foreign workers into the U....

‘Free Tibet’ Message Masks Rootkit Malware

Malware creators are taking advantage of the controversy over the upcoming Olympic Games to spread their wares for illicit financial gain. Latching onto the Free Tibet political demonstrations that have spread around the world, would-be thieves have embedded a piece of rootkit malware that logs keys...

Same Foot, Smaller Footprint With Virtualization

The potential to increase server utilization is the primary reason virtualization has been gaining traction in the enterprise. Cost reductions -- through greater data center efficiency, flexibility, lower energy usage and space needs -- are others. Though it does not directly impact the functional ...

Answering Smartphone Users’ Calls for Backup

As our reliance on smartphones continues to grow, so does the fear of losing all the information they contain -- and for good reason. Fierce competition among handset manufacturers and carriers has resulted in a chaotic, seemingly impenetrable jungle of incompatible makes and models with backup and ...

How Big Should Your IT Footprint Be?

The word "footprint" has gained a lot of currency of late, particularly when talking about carbon consumption and emissions, but also within the IT world. Seen in its original and primary form, a footprint contains lots of information about the identity and nature of the beast that made it. Looking ...

The Perils of Nanotech, Part 2: Reining In Runaway Research

Advances in nanotechnology have given flight to some seemingly fanciful, and also alarming, projections and fictional scenarios. Yet the applications of nanotech are so diverse and far-reaching that scientists agree that the widespread ability to manipulate matter on the nano scale -- one-billionth ...

The Perils of Nanotech, Part 1: Dancing in the Dark

There's probably no field of applied scientific research with applications as diverse and implications as profound as nanotechnology. Advances are coming fast and the research environment is heady as billions of dollars each year go into nanotech research and development. Yet while nanotechnology's ...

New Security Suite Blocks Data Diversion

Perhaps like no other industry before it, the IT industry has come to thrive on continuous innovation coupled with rapid and widespread product introduction. In the competitive -- at times mad -- rush to be first or early to market key things are sometimes overlooked. When it comes to security, it i...

Malware Purveyors Had Banner Year in ’07

2007 turned out to be "one of the most remarkable years in the history of malware," according to the recently released "ESET Global Threat Report 2007." The movement of new digital devices, social networking channels, operating systems and platforms into the mainstream is providing malware creators ...

A Recycled Laptop’s Journey, Part 2: Doing the Job Right

Part 1 of this series looks into the issue of PC recycling and following the course of a hypothetical laptop through the recycling process. Continuing down this path, this part will consider another situation: Laptop owner Joe Verdi doesn't own a laptop from a brand name OEM with a take-back program...

A Recycled Laptop’s Journey, Part 1: Exporting Toxic Waste

While they are instrumental in disseminating information and raising environmental consciousness, our dependence on digital electronics is also putting ever greater strains on us and our environment. "Manufacturing a desktop computer and 17-inch CRT monitor uses at least 240 kg of fossil fuels, 22 k...

Technewsworld Channels