Recent Articles
-
Red Hat Gives Away Fedora Core
Summary: Fedora Core 1 A reasonably good start for a very promising Linux distro. Tinkerers should give it a shot. Those wanting a bug-free experience should skip this version and wait for the next release. Web: http://fedora.redhat.com Pros: Easy install, lots of software Cons: No MP3/DVD playing and a buggy application install tool Price: Free…
-
Longhorn Alpha Is Available to MSDN Subscribers
It appears that subscribers to the Microsoft Developer Network can obtain the version of Longhorn distributed to attendees of Microsoft’s recent Professional Developers Conference. The PDC Build is ready for MSDNers to download.
-
Cisco Unveils First Line Of 802.11g Products
Cisco Systems Inc. has launched its first line of 802.11g devices. The company’s new Aironet 1100 and 1200 access points are backwards compatible with Cisco Aironet and Cisco Compatible 802.11b clients and the Cisco Wireless IP Phone 7920. Cisco also released its new 802.11 a/b/g-enabled client adapters for notebooks and desktops. Read the full story…
-
Reseller InfoSystems Sews Up Goody’s Deal
When Ken Boyd walked into Goody’s Family Clothing Inc. six years ago, he wasn’t just starting a new job as technical services director; he was walking into a new way of doing business. As lead systems analyst at his previous company, Boyd had grown accustomed to going through IBM directly for products and services—and IBM…
-
BI Software Keeps Eye on Disease
Since the Sept. 11, 2001, terrorist attacks, the U.S. medical community has been on high alert preparing for Anthrax and other biological attacks, as well as dealing with actual outbreaks of new diseases such as SARS and the West Nile virus. To fight this two-front battle of threat and outbreak, the medical community is turning…
-
Honeypots, the Hottest Thing in Intrusion Detection
Firewalls used to be considered sufficient protection for an organization’s network. They are not anymore. The rapid growth of the Internet has provided hackers and other attackers with the ability to inflict major financial and public relations damage on an organization. Attackers are constantly developing new tools to exploit the applications necessary for an organization…