HomeSoftware

Software

Microsoft sweetens licensing model

Microsoft Corp. has signed up the first commercial open-source vendor for its Shared Source licensing program, the company announced last month at the Open Source Business Conference in San Francisco.

HP bolsters LAN switch intelligence

HP ProCurve last month unveiled additions to its wiring closet, aggregation and core switch lines, featuring support for power over Ethernet, a revamped programmable ASIC and more flexible media options.

Linux-based software tackles virtualization

SWsoft last month announced upgraded open source software that it says enables customers to move a virtual server and its contents to a new physical server without service interruption.

Vista promises end-users that secure feeling

There should be some empathy for those IT vendors tasked with developing products that aim to protect and manage the infrastructures upon which businesses are built and livelihoods depend.

Funding key to open source success, Ellison says

The success of Linux and other open source projects has depended heavily on the support and investment of major IT companies, Oracle Chief Executive Officer Larry Ellison said.

The legal ‘perils’ of open source software

Whatever the technological and economic advantages of open source software, there is a potential legal risk from software that doesn

SMS R2 features patch ability, software flaw scan

Microsoft released the first beta of System Management Server R2 and said the software would be generally available in May. SMS R2 includes two prominent features, a new catalog service that will let users download third-party patches directly into SMS and a new vulnerability-scanning engine to discover misconfigured software.

Oompa-Loompa not everyone knows

Oompa-Loompa (also called OSX/Oomp-A or Leap.A) - both the original Trojan horse and two variants that have been found in the wild - pose some level of danger for Mac users. This document outlines the way this Trojan horse functions, how it transmits itself to other users, and how Mac users can protect themselves.

Popular Posts

Software Videos

Software Downloads

Software Blogs

As intelligent applications become more popular, here’s what product leaders need to know

Intelligent applications are software applications with behaviors and outcomes achieved through learning, using one or more artificial intelligence (AI) techniques. These applications are applicable...

Slideshows

Aligned and Connected: An Outsourcing Case Study

Edmonton-based PCL Construction is a group of independent construction companies that operates across Canada and around the world. Founded in 1906, today PCL is...

Developer velocity a new road to business transformation

Companies that empower their developers achieve more. That’s the conclusion of a pair of Microsoft studies that found surprising correlations between business performance and...

Three common DCIM pitfalls and how to avoid them

To the question of whether data center infrastructure management (DCIM) works as intended, it depends on who you ask. Those who have successfully deployed...

The iX1500 can be your organization’s secret weapon

The further the world moves into the digital era, the more trendy it seems to become in certain circles to critique all things digital....