close
The Wayback Machine - https://web.archive.org/web/20071231160831/http://www.techworld.com:80/
Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT

 

Google back in court over patent infringement

Google back in court over patent infringement

Google is back in court on patent infringement charges, following a US court of appeals overturned part of a lower court decision.

Read this Software Applications story »


News Headlines

More IT News »


Techworld Video

Learn from the expert: DNS architecture
In this second part of a three-part presentation, DNS expert Cricket Liu describes how a typical multinational corporation could configure its DNS architecture and poses some questions on issues that IT managers might face.

To catch up on the first part of the presentation - click here.


Advertisement


Blogs

More Blogs »


Topic Areas

  • Focus on Endpoint Security:
    Do you know what your users are up to? As workforces become more mobile, and as storage devices become more portable, there are increasing levels of danger being faced by network administrators. The Focus On zone offers you a range of articles to help you manage this vital aspect of your business.
  • SOA Partner Zone:
    It's all about integration. That's not just about integrating applications but about integrating business processes and services too. The last named is particularly important as companies move towards a service-oriented architecture (SOA). In this BEA sponsored Partner Zone, you can read how the company is committed to helping its customers achieve business integration incrementally, flexibly, and reliably.
  • The IT evolution Partner Zone:
    IT is evolving: we are moving from the old generation of computing based on an inflexible way of working to a more agile and efficient type of IT department. This Partner Zone looks at the technologies that are driving this change and examines how businesses should cope with this new world ot IT.

Advertisement



VirtualBox 1.5

VirtualBox 1.5 review

VirtualBox is a modular VM solution that lends itself to integration and customization. Its availability as an open source option makes it an attractive choice for in-house projects; however, lingering bugs in the UI and network integration tarnish what would otherwise be a worthy alternative to VMware.

Read this Operating Systems and Servers review »


Reviews

More Reviews »


BERJAYA BERJAYA

Spiceworks IT Desktop
The Spiceworks IT Desktop is a free network inventory, monitoring and help desk application designed, tested and used by 120,000 IT pros in 185 countries. It takes just minutes to install, has a friendly browser-based interface, and combines the features needed every day to manage a network in a small or medium-sized business. The Spiceworks IT Desktop is now available free for registered users of Techworld.com.

BERJAYA

Advertisement



Articles


White papers

  • Comfortable Remote-Access without Compromises

    Astaro “One-click-VPN” solution offers new ways combining the ease of use of SSL with the functionality of traditional techniques.

  • Guide to Choosing an Embedded Relational Database
    MySQL is the most popular database for ISVs, VARs, hardware vendors, and network appliance manufactures who want to cost effectively embed or bundle a reliable, high performance relational database.
  • From OpenView to Open Source
    Unsure if open source is right for you? Learn the drivers for considering open source and the IT situations where open source makes sense. This white paper discusses mature open source systems and network management alternatives to traditional proprietary solutions.

More White papers »



Advertisement

IDG Connect UK
  • A Business Approach to Right Time Decision Making
    The upshot of information arbitrage is that organizations optimize performance, because workers can correct problems and exploit new opportunities before it is too late to affect bottom-line results.
  • The Need for Vulnerability Management
    This guide describes the need for VM. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. Find out more

Techworld topic pages