Adjustments to XL Axiata's DNS servers and redirecting traffic to nearby servers has increased mobile speeds in Indonesia using existing resources.
Showing results 1 to 20 of 340
IBM said the feature is unique to Trusteer, its endpoint protection software that guards against advanced malware attacks.
The corporate IT integrator's App Marketplace caters specifically to customized software for sales support, customer relationship management, human resources and other business processes.
Rick Vanover and Jason Perlow talk about the risks of specific "free" software that can cause issues on computer systems through adding pop-ups, sending information or proxy serving other traffic.
A confidential U.S. government report indicates that the Target data breaches were tied to a broader effort against retailers. New malicious software called KAPTOXA led the attacks.
Small to medium businesses have the same need to monitor and manage their IT solutions as larger firms. They don't, however, have the same resources. Anturis believes its software as a service cloud-based monitoring and management offering is the solution.
Managing complex workloads in a dynamic environment made up of physical, virtual and remote/cloud-based resources can be difficult. Puppet Labs believes its Enterprise 3.0 software will make life better for operations, administration and development staff members.
Siemens shares the lessons learned on its human resources IT software-as-a-service journey.
The U.S. Department of Veterans Affairs wants to replace its 50-year-old human resources application with a sleeker software-as-a-service model.
Dell Software this week delivered Foglight for Virtualization Enterprise Edition, to extend the depth and breadth of managing and optimizing server virtualization, as well as virtual desktop infrastructure (VDI) and their joint impact on such IT resources as storage.
Companies embarking on app development and implementation should consider making sure the software is supported across platforms, but not at the expense of depleting IT budgets and other resources.
IBM is close to the midway point in its acquisition road map to round out the resources needed to make its software solutions group "smarter."
The software giant will disband its research and development unit in the region by the end of next month as it consolidates its resources in Beijing.
Cisco continues its spending spree as it buys a privately-held networking firm, which specializes in developing software for network traffic management.
A team of researchers from North Carolina State University say they may have cracked the problem of Wi-Fi hotspots buckling under the pressure of too many concurrent users, through a tool they have developed called WiFox.
Cloupia's software will enhance Cisco's unified dashboard, which is used to monitor and manage computing power, storage, networking, virtual machine and operating system resources.
Advertisers are deceived into paying for fake Web traffic generated by bots, and systems in Asia-Pacific are also more vulnerable to such attacks.
Microsoft has outlined the main third-party software through which cross-platform attacks Windows, Mac, and Linux computers: old vulnerabilities in Java, Adobe Flash, Adobe PDF applications, and Microsoft Office.
Cloud computing allows developers to get access to compute resources faster, freeing IT operations to build self-service environment and provide software support and security.
Model of giving free or trial versions of software to entice enterprise end-users deserves consideration, since they now bypass IT departments and utilize alternative online resources, analysts say.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)