With all the media emphasis on Internet-related fraud and identity theft, one might think the Internet is a dangerous place for commerce. As it turns out, though the Internet certainly has its risks, incidents of fraud and identity theft from other more traditional means outnumber those online. If recent stats are to be trusted, incidents […]
It should come as little surprise that over the past year awareness of VoIP has increased in the marketplace. Surprisingly though, a recent study from industry heavyweight Level 3 Communications found that despite increased awareness of VoIP as a service option, familiarity with the actual benefits of VoIP is actually decreasing. Level 3’s VoIP Market […]
The father of Linux and copyright holder of the Linux name is not in favor of the GPL 3. Linus Torvalds has publicly posted his thoughts to the Linux Kernel Mailing List (LKML) about the update to the GPL license, under which the Linux kernel itself is licensed. His opposition to the new license may […]
Barely a week old, GPL 3 is a draft intended to solicit discussion and comment. While IBM and Novell think that it’s still a bit early to tell, others, such as the leader of the community-based Debian GNU/Linux distribution, are a bit more vocal in their satisfaction with the direction the draft is taking. Unlike […]
If you’ve had some form of computer security incident in the past year, you’re part of the majority. According to the FBI’s just released 2005 Computer Crime Survey, 87 percent of respondents reported some form of computer security incident in the past year. To add insult to injury, the study found that respondents encountered nearly […]
Within the next two years, IPsec will no longer be the dominant remote access technology. According to research firm Gartner, SSL-VPNs will be the primary remote access method by 2008 for greater than 90 percent of casual employee access, more than three-fourths of contractors and more than two-thirds of business telecommuting employees. SSL-VPNs offer the […]
Which operating system logged the most vulnerabilities in 2005? According to the United States Computer Emergency Readiness Team (US-Cert) 2005 year-end index, Unix/Linux racked up more reports of vulnerabilities compared to Windows. Security professionals, however, argue that the numbers alone don’t tell the full story, and that a properly configured Unix/Linux server is likely more […]
PHP has long been a favorite dynamic programming language for Web developers. After 10 years of growth, 2006 looks to be a banner year for the open source language as its collaboration framework, partner ecosystem and the language itself are expected to grow and gain new users. Look for a confluence of three distinct branches […]
More mobile users means more strain on networks and IT resources that few are properly prepared to deal with. The Business Performance Management (BPM) Forum and Avaya conducted surveys of enterprise executives to reach these conclusions. The BPM Forum study, entitled “The Remote Revolution: Uptime Issues, Implications & Imperatives in the Mobile Workforce,” found that […]
Symantec now holds a patent for histogram-based malicious code detection. The newly patented technology offers the promise of accelerated IT security Risk-threat detection. According to the U.S Patent and Trade Office Abstract for patent number 6,971,019, the patent is for a virus-detection system that uses a histogram to detect the presence of a computer virus […]
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.