Recent Articles
-
SAP Faces Challenges Ahead
SAP has had its share of ups and downs recently. On Jan. 11 the company disclosed fourth-quarter and full-year earnings for 2006 that will miss not only analyst expectations, but SAP’s own earlier predictions as well, when the full report comes out Jan. 24. There’s also a chance the company’s CEO may not renew a…
-
3PAR Launches New ‘Green Storage’ Initiative
Storage provider 3PAR on Jan. 19 took the idea of “greening” the data center a step further by announcing that for every terabyte of its Thin Provisioning storage capacity it sells in 2007, 3PAR will purchase the equivalent cost in so-called “carbon credits” to help offset the greenhouse gas emissions of the disk drives required…
-
Analyst: Linux Profits by Novell-Microsoft Deal
It’s no secret that many people in the Linux community dislike Novell’s recent Microsoft partnership. To some analysts, though, the deal is a feather in Novell’s market cap. Open-source activist Bruce Perens started an online petition to protest the deal. A group of people launched a Web site with a self-explanatory name, Boycott Novell. And,…
-
Spammers’ Fake Newsletters Slip by E-Mail Filters
A new technique being employed by malicious spammers is testing the ability of e-mail filtering technologies to tell the difference between legitimate newsletter content and messages bearing unwanted advertisements and hidden links to malware sites. According to researchers at security software market leader Symantec, a new trend is rapidly emerging among bulk spammers where the…
-
The Man Behind Microsoft’s Expression
Forest Key is leading Microsoft into uncharted territory for the software giant: the land of professional design tools. After years of continual leadership in the developer tools space, Microsoft is marching in with a set of tools for designers, having announced its Expression suite last month. Key, who is director of product management for Microsoft’s…
-
The New Threats Are on the Server
When I think of the prototypical botnet, I think of cable modem users with teenagers downloading programs that they assume to be other things. There are many other typical scenarios, and while they’re perfectly accurate, it’s probably true that most bots are hijacked broadband PCs. But there is another type of dangerous botnet out there…