With NPIV, virtual machines are given their own virtual HBAs and worldwide names
[ September 2007, Security ]
The Integration Pack for Salesforce is being offered as a limited-use, subscription-based suite of Informatica's PowerCenter8 tools
[ September 2007, Business Intelligence
Real-Time Decision Manager will use predictive analytics and decision logic to make recommendations and offers based on customer eligibility or propensity to buy scores or calculate customer credit worthiness based on historical transactions
[ September 2007, Business Intelligence
First and foremost, Barcelona is a Rev F chip, which means it plugs into the same 1207-pin sockets as other Rev F chips and, because the thermals for these quad-core chips are essentially the same as those of existing dual-core chips, there is no reason to worry about extra heat
[ September 2007, PCs & Workstations
IBM rolled out a new blade based on the Cell chip, the QS21, which has twice the amount of main memory per processor
[ September 2007, Servers & Mainframes
These adapters are intended for point-to-point connections or for startup scenarios where you want to connect something like a Microsoft SharePoint portal or other .NET application with Oracle, Siebel, or SAP
[ September 2007, Servers & Mainframes
Embedding a virtual machine hypervisor into a server, workstation, desktop, or laptop is the next logical thing for the computer industry to do
[ September 2007, Servers & Mainframes
Sun is now a certified Windows OEM partner, which means that it can pre-install, sell, and support (it also means revenue) Windows Server 2003 on its Galaxy servers
[ September 2007, Operating Systems
To obtain the ICDL, a candidate must demonstrate practical proficiency in each of the most commonly used software tools
[ September 2007, Training + Certification
Welcome to what is quickly becoming the hyperconnected world – a new era in communications where anything that could benefit from being connected will be connected to the network
[ September 2007, Networking
The future holds many exciting challenges – from content creation to developing other means of access technologies, to new industry paradigms and the invention of new business models
[ September 2007, Networking
95% of network attacks (hacker, virus, worm) and most downtime and out of compliance issues is due to exploits against known weaknesses in a network device, PC, server, firewall
[ September 2007, Security
“The challenge to the industry is to design a simple UI with business-level consistency.”
[ September 2007, Application Development
[ September 2007, News + Events
A small survey of IT managers conducted by Forrester Research found that most respondents are waiting for SP1's release before seriously considering their upgrade plans
[ September 2007, Operating Systems
Ovi.com is a gateway to Nokia services for compatible mobile phones and any PC
[ September 2007, Mobile Technology
Sugar 5.0 takes another step towards development platform status and debuts SugarCRM's multi-instance on-demand architecture
[ September 2007, Operating Systems
Fortinet develops its own ASICs (network and content processors) as well as its own operating system, and already performs functions such as compression and traffic shaping, which are also requirements for optimisation
[ September 2007, Networking
Anti-spam technologies are available in multiple forms, including a fully managed service, a range of appliances and software solutions tailored to suit different sizes and types of companies with different risk profiles
[ September 2007, Security
![]() | ![]() | Copyright c1995-2009 Technews Publishing (Pty) Ltd.. All rights reserved. |