Noticias y opinión en Seguridad informática
Old warrior clobbered
Free plug-ins allows automated fail over
Cost-conscious businesses looking to maximize the amount of data storage available might turn to IceWeb and the company's Iplicity platform.
Un nuevo grupo de la industria está intentando aplicar los principios del código abierto al diseño y construcción de centros de datos, algo que, según sus portavoces podría acelerar el uso de nuevas tecnologías e incrementar la competencia en el mercado.
Google sees value in using location-based services, such as Google Latitude and Google Buzz to connect to disparate Web services and provide recommendations, but the search engine believes it's important to mitigate the potential privacy scares associated with such services. To do this, Google product manager Steve Lee said making such services opt-in is crucial. There would also have to be a mutual understanding between the friend providing the recommendation from an app and the recipient of the recommendation for this to work.
The openSUSE project has released milestone 3 of its version 11.3 right on schedule. The update to GCC 4.5 has unfortunately caused a few problems.
Analyzing the connections between sites could help spot Web attacks.
Quantum cryptography only works if Alice and Bob share their relative positions in advance. Now physicists have worked out how to do it without this information
Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.
New standard, expected to be named in 2012, will likely serve for 20 years