IBM's Jeopardy!-winning supercomputer, Watson, may have started out the size of a master bedroom, but it will eventually shrink to the size of a smart phone, its inventors say. The supercomputer is currently performing "residencies" at ...
Tags: IBM, supercomputer, smart phone
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations. Based in Waltham, Massachusetts, the company sells a ...
Tags: Bit9, Web application vulnerability, network
Canonical, the open source software company behind the popular Ubuntu distribution of Linux, has unveiled the next stage in its plan for a unified operating system. The Ubuntu tablet forms one-quarter of Canonical's strategy to produce a ...
Tags: Ubuntu tablet, operating system, software
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
Intel today released a version of its SSD-based Cache Acceleration Software (CAS) for Linux servers, which it said can offer up to 18 times the performance for read-intensive applications, such as on-line transaction processing systems. ...
Tags: Intel, Cache Acceleration Software
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...
Intel today released a version of its SSD-based Cache Acceleration Software (CAS) for Linux servers, which, the firm said, can offer up to 18 times the performance for read-intensive applications, such as on-line transaction processing ...
Tags: Intel, SSD-based CAS, Linux servers
Concurrency, Inc., the 2012 Microsoft Central Region Partner of the Year, announced today that employees Nathan Lasnoski, Shannon Fritz, and Annur Sumar have each been awarded "Most Valuable Professional" status by Microsoft Corporation. Of ...
Tags: Concurrency, Microsoft, company news
Dell is planning to release by mid-year a computer that's all of 3.5 inches long and 1.5 inches wide. It's not much bigger in girth than a USB stick, and is similar in design. This Wi-Fi enabled device is designed to be plugged into ...
Those who want to try the much-hyped Hadoop but haven't got a cluster or two to spare can now test the data processing platform on their desktops, thanks to a new release from Hadoop distributor Hortonworks. Hortonworks Sandbox is a ...
With the release of the first service pack for Microsoft System Center 2012, Microsoft is taking another step in its ambitious goal of helping customers manage their on-premises IT and Microsoft Azure cloud services with a single set of IT ...
Tags: Microsoft System, on premises IT, cloud service, IT management
The majority of UK organisations now employ server virtualisation, but new research reveals that there may be a significant shortfall in their software licensing compliance, according to software asset management firm License Dashboard. ...
Tags: UK organisations, server, virtualisation, software licensing compliance
Computerworld - Microsoft's Windows 8 Pro upgrade discount will expire in about three weeks, at which point the company will triple or even quintuple the current price of the new operating system, according to several online retailers. On ...
Tags: Windows, operating system, Microsoft, PCs, Windows 8
Storage is a key component of IT strategy. After all, data is the lifeblood of any business. But storage is there to provide data for processing by business critical applications, and the way that data is processed is undergoing huge ...
Tags: storage, IT strategy, virtualisation, 2012, Top 10