Enterprises should ask a lot of questions when a vendor touts its business intelligence(BI)products as being fully integrated with Hadoop. The hype around Hadoop has pushed many BI vendors to proclaim their support for big data technology ...
Hitachi Data Systems(HDS)today introduced a new version of its Hitachi Unified Storage(HUS)array that allows file,block and object-based data to be stored through a single management interface. The HUS VM(virtual machine)array is aimed at ...
Tags: Hitachi Data Systems, Hitachi Unified Storage, HUS VM array
Google-owned Motorola Mobility is infringing a Microsoft patent related to text input,a lower regional court in Munich decided on Thursday.The verdict will result in a sales ban on some phones,and Motorola will also be liable for damages if ...
Tags: Microsoft, Google-owned Motorola Mobility, patent, Munich
PC World-After numerous delays along the way,OpenSUSE Linux 12.2 on Wednesday finally made its long-awaited debut. "Two months of extra stabilization work have resulted into a stellar release,chock-full of goodies,yet stable as you all ...
Tags: OpenSUSE Linux, Improvements, faster speeds, improved infrastructure
Extending its line of identity management software, Quest Software has released an application to help administrators more easily control who accesses documents on the corporate network. While enterprise applications such as Oracle's ...
Tags: Quest, software, identity management software, enterprise applications
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on ...
Tags: Hardware, Basic Input Output System, computer technology, Brossard
Computerworld-The U.S.Department of Homeland Security(DHS)has issued an alert warning of vulnerabilities in a software technology called the Niagara AX Framework,used to manage millions of devices over the Internet. The alert,from the ...
Tags: DHS, Vulnerabilities, Niagara AX Framework, devices