What folks who haven't read any of the early Steve Jobs biographies don't know is that Steve Jobs -- at least, the way he was seen in public -- wasn't any more real than Ronald McDonald. He was a creation of Apple's advertising agency that successfully reformed Steve -- a slovenly guy who didn't lik...
Windows 8 finally made it to prime time last week. This version of Microsoft's operating system makes significant improvements in its security stance, said Alex Balan, a senior product manager at Bitdefender, but some of them are likely to be undermined by users wedded to old programs. The way the W...
The general public knows little about the true technology fundamentals of cloud computing, suggests a recent survey commissioned by IT vendor Citrix. Almost a third of the roughly 1,000 U.S. adults polled thought cloud computing was related to weather. However, the ascendance of Linux and open sourc...
Chief executive transitions in the IT industry often tend toward melodrama or at least bald quirkiness: The number of ignominious CEO departures at HP and Yahoo could qualify both companies for their own telenovelas. After successfully acquiring Sun Microsystems, Oracle unceremoniously booted CEO Jo...
Citrix is acquiring privately held Bytemobile, a provider of data and video optimization applications for mobile network operators. The deal will give Citrix exposure to a burgeoning market -- mobile infrastructure -- and extend its reach to points around the world. The acquisition builds on a partn...
For those familiar with traditional thin-client computing, virtual desktop infrastructure solutions feel virtually like old home week with a couple of notable exceptions. First, rather than depending on dedicated data center-to-desktop hardware resources, VDI leverages server, storage and networking...
VMware on Wednesday unveiled a portfolio of end-user computing products to help manage the slew of personal mobile devices corporate employees are bringing into the workplace for use. The products are built into version 5.1 of the company's VMware View enterprise virtual desktop. In an enterprise vi...
In the years since thin client computing arrived on the IT scene, it has been pronounced dead, only to arise again more often than Jason in the "Friday the 13th" film franchise. That's not due to any quality of its underlying architecture. In fact, thin client engineering is often elegant in the ext...
In the run-up to the launch of any of Intel's newest generation Xeon CPUs, most every server vendor and its extended family starts jockeying for position over who has the bragging rights for the fastest, biggest, baddest x86 systems on the planet. The resulting Power Points tend to be mind-numbing, ...
The Obama administration's program to modernize federal information technology operations is now in its second year, and the momentum for reform is continuing at a high level. "We are seizing on the power of 21st century technology to consolidate data centers and moving to lightweight, shareable tec...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.