Data-center networking vendor Emulex plans to acquire Endace, a maker of network performance management hardware and software, for about $130 million, the companies announced. The buyout will add Endace's network monitoring appliances, ...
Tags: networking vendor, Emulex, Endace, hardware, software
IDG News Service-EMC is updating its NetWorker backup and recovery software on Tuesday with an eye to greater efficiency,tighter integration with other EMC products,and cloud computing. NetWorker 8 is the most significant new version of ...
JetBrains has thoroughly revamped its IntelliJ Idea IDE for Java, redesigning the user interface on top and installing a new, faster compiler underneath. IntelliJ 12 is also the first version of the integrated development environment to ...
Tags: JetBrains, IntelliJ Idea, IDE, Java
Leading global configure, price, quote (CPQ) system chosen by online IT infrastructure provider to streamline sales processes worldwide. Cameleon CPQ chosen to make the sales and customer experience better and more efficient. Cameleon ...
Tags: Cameleon Software, Software, PEER 1, Sales Operations
To break its slump in the server market, Advanced Micro Devices is embarking on an aggressive strategy that calls for ARM and x86 chips by 2014 and continued improvements to its Opteron line in the meantime. The company on Tuesday ...
Tags: AMD, server, x86 chips, Opteron Processors, low-power Opteron processors
Advanced Micro Devices has cut orders to contract chip manufacturer GlobalFoundries, expecting a "choppy demand environment" in the next few quarters. The company said Thursday it has amended its wafer-supply agreement to cut its purchase ...
Tags: chip, AMD, GlobalFoundries, PC, server, graphics processors
Macworld - Today's article looks at two symptoms that continue to harass iTunes Match users. It is a follow-up to my column, from last November, on "three essential" iTunes Match troubleshooting tips. Unknown errors when matching At ...
Tags: Bugs, Fixes, Match problems, Mac
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
IDG News Service - Researchers from security vendor AlienVault have identified a variant of a recently discovered Internet Explorer exploit that is used to infect targeted computers with the PlugX remote access Trojan (RAT) program. The ...
Tags: IE, malware, Internet Explorer, website
IDG News Service - Faced with the challenge of overseeing the health of large caching systems, a Facebook engineer developed heat-map software to quickly pinpoint problems in the social network's data centers. The visualization monitoring ...
Tags: Facebook, data center, social network, social networking
A little more than a year after Mozilla debuted a customized version of Firefox starring Microsoft's Bing search engine, the open-source developer on Tuesday shipped another Microsoft tie-in, Firefox with MSN. MSN is a Microsoft-owned ...
Tags: Mozilla, Firefox, Microsoft, Bing search engine, MSN
Rackspace was one of the first players in the cloud arena. The company recognized early that enterprises wanted faster, simpler ways to spin up and spin down servers. If the bosses are going to be fickle and impulsive, there will always be ...
Tags: Rackspace, cloud arena, IT, IaaS
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
A hacker is selling a$700 zero-day exploit for Yahoo Mail that lets an attacker use a cross-site scripting(XSS)vulnerability to steal cookies and hijack accounts. The hacker,known as"TheHell",created a video to market the exploit on an ...
Tags: hacker, Yahoo mail
Technology firms including Google,Apple,eBay and Yahoo were among almost 300 companies whose websites were hit by a hack attack in Pakistan. The attack,which exploited vulnerabilities in domain name systems(DNS)to redirect ...
Tags: Googl, Technology firms, attack in Pakistan