
RSA weak keys flaw restricted to network devices
However these weak keys were almost in every way restricted to embedded devices: "firewalls, routers, VPN devices, remote server administration devices, printers, projectors, and VoIP (Voice over Internet Protocol) phones" from over 30 manufacturers. More...

NetSocket Service Visibility Solution⢠Now Rated 'Avaya Compliant
NetSocket, the leading supplier of real-time IP service assurance and provider assurance solutions, today announced that its Service Visibility Solution Suite has received the Avaya DevConnect Compliant Award for its compliance with IP communications solutions from Avaya, a global provider of business collaboration systems, software and services. More...

VCompute Rolls Out New vPOC Cloud to Address Continued Demand
vCompute announced today that it has deployed and enabled a new vPOC location consisting of thousands of cores in Houston, Texas. This new infrastructure is implemented to support continued demand for cloud and high performance computing resources. More...

R Cable Selects Acme Packet Session Border Controller
Acme Packet®, the leader in session delivery networks, today announced that R Cable y Telecomunicaciones Galicia, S. A. ®, a leading provider of telephony, television, and broadband Internet solutions, is using Acme Packet Net-Net Session Director session border controllers to deliver IP-based communications services to both enterprise and residential clients. More...

Equation Technologies Certifies Additional Staff on Intacct as Part of Expanding Cloud Computing Strategy
TORONTO, Feb. 21, 2012 /CNW/ - Equation Technologies, a leading provider of software solutions for professional services, project-based businesses, corporate head offices, and nonprofit organizations, announced that they have completed training and received implementation certification for additional staff members on Intacct's cloud financial applications. More...

How To Use the Internet in 'Stealth Mode' (The Key To Staying Private When Big Brother is Watching)
"For the first time ever, it will become technologically and financially feasible for authoritarian governments to record near everything in other words said or done within their borders - every phone conversation, electronic message, social media interaction, the movements of almost every person and vehicle, and video from every street corner. More...

Technology set to change face of mining boom
Topics: work, mining-industry, unemployment, mining-rural, computers-and-innovation, robots-and-artificial-intelligence, australia, wa. More...

7 Emerging Cloud Computing Vendors Providing Performance & Optimization Services
Gartner predicts that by 2012, 20% of businesses will own no IT assets because of cloud computing. Those that retain IT assets will have fewer and fewer in the course of time. More...

Highmark Selects Verizon to Help Develop First Statewide Health Information Exchange to Improve Patient Care Through Sharing of Information
Highmark Inc. on Tuesday announced an agreement pursuant to this agreement which Verizon Enterprise Solutions will deploy and manage the research infrastructure for Highmark's new health information exchange that will in the near future link health care organizations across western Pennsylvania that serve millions of people. More...

China's Mobile Internet Industry to See Rapid Growth & Overall Consolidation
Afterwards years of development, China's mobile Internet industry has entered a period of rapid growth and overall consolidation. . More...







