Please turn on your JavaScript for this page to function normally.
Fujitsu’s 40 Gbps interfaces for its FLASHWAVE 7500 ROADM

Fujitsu Network Communications announced the availability of second-generation 40 Gbps interfaces for its FLASHWAVE 7500 Reconfigurable Optical Add/Drop Multiplexer (ROADM). …

Fedora 11 is now available

Fedora is a Linux-based operating system that showcases the latest in free and open source software. Fedora is always free for anyone to use, modify, and distribute. Fedora 11 …

TweetGrade: online user reputation on Twitter

Purewire launched TweetGrade, which provides a quantitative assessment of a user’s reach and influence in the Twitter community, and it helps people understand a …

DeviceAnywhere introduces Palm Pre to its developer network

DeviceAnywhere added the new Palm Pre phone to its network of 2000+ feature phones and smartphones available over the DeviceAnywhere platform and accessible by organizations …

New book: “The Twitter Book”

Given the intense media spotlight shining on Twitter right now, chances are if you haven’t twittered yet, you’re probably considering it. So what is Twitter? Why …

Netbook privacy filter from 3M

3M announced a new range of privacy filters specifically designed for the netbook market. New Vikuiti Netbook Filters from 3M, initially available to fit 8.9″ and …

First iPhone WLAN management application

E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …

Kerberos 5 Release 1.7 is now available

Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …

Event-based forensics on wireless LANs

E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …

Gartner survey shows worldwide IT budgets to decline 4.7 percent this year

In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …

Network security strategy from McAfee

McAfee outlined details of its network security strategy which integrates McAfee’s complete network security suite, including network firewalls, intrusion prevention …

East European ATM sniffing down to poor code auditing

Reports that malicious hackers have developed a range of data-sniffing and stealing trojans that have skimmed cardholder data from Eastern European ATMs since the end of 2007 …

Don't miss

Cybersecurity news