Bugs are operational failures by vendors and that not only wastes company’s time tracking down, but has the long term impact of stopping companies from adopting new products and features for the sake of reliability. Here are 4 misconceptions vendors tell themselves, and us, about software bugs.
Network Computing
I’m Your Customer, Not Your QA Department!
Comments Off
Categories: General.
Wyse Can Add Up to $2.5B to Dell Revenues
Financial details of the purchase price of today’s announcement that Dell will acquire privately-held Wyse Technology were not released, but company executives put Wyse’ 12-month revenues at $ 375 million, up 45% year-over-year. The associated server, storage and services revenues attached to the original thin-client sale average 5X, i.e. $ 5 of additional hardware, software and service sales for every $ 1 of the Wyse sale.
Network Computing
Comments Off
Categories: General.
Dell Buys Wyse to Continue Evolution to ‘Not Really a PC Company’
Last month Michael Dell let the world know that Dell is “not really a PC company.” Today, Dell announced that it has reached an agreement with Wyse that extends Dell’s portfolio of products and services even further beyond the traditional PC market.
Wyse is an established player in the thin client market. The addition of Wyse will expand Dell’s enterprise solutions portfolio and give it a solid platform for developing and providing cloud software, and desktop virtualization, as well as management tools and mobile apps.
Comments Off
Categories: General.
More Security Breeches: Denial Not An Option!
It has happened again. Another breach. Another report of millions of credit card numbers at risk. Another round of media coverage. Another reminder that despite all the sophisticated technology that enterprises have deployed to protect computer networks, these breaches still happen. But despite the negative publicity that comes from continuing reports of such breaches, the need to be vigilant about thwarting such attacks remains, says Steve Durbin, global vice president of the Information Security Forum (ISF).
Network Computing
Comments Off
Categories: General.
Innovation Reigns at Wireless Expo
This year’s Unwired Innovation Expo (UIE) in Clovis, New Mexico was simply amazing. By now, we’re all a bit desensitized to the wonder of wireless technology, and easily forget that under the hood of our WLAN environments lives some impressive core technology. It takes an event like the UIE to really remind us of just how empowering the wireless industry is to innovative products, and the minor miracles that are possible when our wireless engine is running right. Here’s a look at my favorites from the Expo.
Network Computing
Comments Off
Categories: General.
Box OneCloud Makes Box a Must-Have iPad App
Box.com unveiled OneCloud today–a new service designed to unite the data from various mobile apps. Box OneCloud promises to make it easier to manage data on mobile devices and be productive from virtually anywhere. OneCloud resolves a fundamental limitation of the Apple iPad, and makes Box a must-have app.
Comments Off
Categories: General.
Vault Brings eDiscovery Tools to Google Apps
Businesses generate and consume massive amounts of email and instant messaging communications. For many businesses, all of that data has to be preserved, and produced on demand in the event of litigation. Google has introduced Google Apps Vault–a new service for Google Apps for Business customers that promises streamlined data retention and e-discovery.
Comments Off
Categories: General.
Five Things Microsoft Should Fix in Windows 8 to Prevent Another Vista
Windows 8 marches on toward its inevitable release–not yet confirmed, but expected sometime in early fall. Judging by the Windows 8 Consumer Preview release, though, the latest version of Microsoft’s flagship operating system has some fatal flaws that could turn it into another “Windows Vista” scenario, and cause users to cling to Windows 7 as they’ve clung to Windows XP.
Comments Off
Categories: General.
Data Classification Tips & Technologies Part 2
Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well.
Network Computing
Comments Off
Categories: General.
