TODAY'S TOP STORY
Beware Hijacked Social Networking Accounts, FBI Warns
Social networking sites are becoming a more popular attack vector for cybercriminals because people trust those they believe to be friends. RELATED INSIGHTS
• Defense Department Loves Social Networking Again
• Salesforce.com, RightNow Embrace Social Networking
ALSO SEE
IBM To Launch Web-Based E-Mail Service
LotusLive iNotes puts Big Blue into competition with Google's Gmail service.
AT&T Buys VeriSign Security Consulting Unit
The deal could boost AT&T's network-based security offering to enterprise customers.
Xerox-ACS Deal Faces Legal Challenge
Proposed class-action suit says merger agreement undervalues ACS and dissuades other bidders.
Global CIO: The Difference Between Strategy And Tactics
So you want to look like a genius? Most often, we stumble our way into the greatest of breakthroughs.
Nortel To Sell GSM Business
The company's GSM and GSM-R operations are not expected to draw as much as the $1.13 billion Ericsson paid for Nortel's CDMA, LTE units.
Microsoft Touts Hyper-V Live Migration
Virtual machine live migration is the top new feature of Windows Server 2008 R2, Microsoft says.
BlackBerry Gets Mac Syncing Software
The software enables BlackBerry users to sync their calendars, contacts, applications, and media with Macintosh computers.
Feds Award $27.8M For Rural E-Health
Department of Health and Human Services funding will go to implement electronic health records and other health IT initiatives.
MORE NEWS
FEATURED BLOG
Selecting A Storage Foundation for Virtualized Servers
Posted by George Crump
The challenge for virtual infrastructure administrators is that there are so many options that it can be confusing. There are several steps to take when selecting a storage foundation for virtualized servers and our next series of entries will cover these steps.
ALSO SEE
Compliance & Security Often Forgotten w/ UC
Posted By Fritz Nelson
One of the big hurdles in deploying unified communications, especially where it includes Web-based technology (think Skype, Instant Messaging, even texting), is how to tie all of that rogue communication into your compliance and security policies. That's the topic of our Whiteboard Tutorial today.
Man Threatens His Own iPhone With Gun In An Apple Store
Posted By Eric Zeman
You just can't make this stuff up. Apparently a man brought his iPhone to the Genius Bar at an Apple Store. He also brought his 9mm piece, which he brandished and pointed at his iPhone, threatening to shoot it.
Is Apple Getting Ready To Re-Invent The Mouse?
Posted By Mitch Wagner
Apple is the company that introduced the world to mouse computing; could it now be planning to re-invent the mouse, maybe introducing a new kind of input device that combines the mouse and keyboard? That's the speculation buzzing on the Apple blogs today, fueled by a patent out of Cupertino.
Android Army Gains A Soldier Of ONE
Posted By Eric Zeman
An unknown company hailing from Spain has released information about a brand new Android device. The Geeks'Phone ONE boasts some impressive specs, and the company expects to be able to sell it unlocked for about $375.
MORE BLOGS
Boeing seeking Procurement Agent 4 in Huntsville, AL
Brookhaven National Lab seeking PeopleSoft Programmer in Upton, NY
Osram Sylvania seeking Senior Sales Representative in Seattle, WA
Lennar Corporation seeking Director, Information Technology in Miami, FL
UPS seeking Package Handler in Harrisburg, PA
For more great jobs, career-related news, features and services, please VISIT OUR CAREER CENTER