General

Last Updated on 27 Nov. 2014, Total: 154 Blog Posts

  1. Visual Studio 2010 Training Kit

    If you are a Visual Studio 2010 inexperienced user and need some help, then I suggest you download the following training kit from Microsoft. The Visual Studio 2010 and .NET Framework 4 Training Kit The training kit includes demos, presentations and hands-on labs that help you leverage the various features found in this development tool. Visual Studio 2010 is a... Read More

  2. Vulnerability in Cryptocat

    A new vulnerability in Cryptocat - the free software that provides an open and encrypted Instant Messaging environment from your browser is known to affect versions 2.0 and 2.0.42 (2.0.42 not included) of this web-based IM... Read More

  3. Vulnerability in Microsoft graphics component could allow remote code execution

    Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More

  4. Webinar - Scalable Database Architectures

    Scalable Database Architectures Webinar... Read More

  5. Webinar - The Case for Managing ESI in the Cloud

    How can you better manage your MS Exchange environment and cut down on storage costs? What are the key benefits of managing MS Exchange in the cloud? What is the business case for managing email in the cloud?... Read More

  6. Webinar - The TCO of Windows-to-Go Secure Workplace: Enabling Contractors and Teleworkers

    An interactive webinar that will help you understand what a Mobile Workspace employing Windows-to-Go can and cannot do for you... Read More

  7. Webinar - Unlocking IT with Big Data

    HP Software Web Event - Driving the New Style of IT... Read More

  8. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  9. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  10. What does a mobile devices manufacturer know about its customers?

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence... Read More

Featured Links