Latest articles for Network World

Mac attack

Mac attack

Over the years, ¬†Apple ¬†has earned a less-than-stellar reputation among purchasers of enterprise desktops. Macs were seen as overpriced to begin with. And Apple didn’t…

3D conferencing hits the enterprise

3D conferencing hits the enterprise

Immersive virtual environments – such as Second Life and some enterprise-friendly alternatives – have traditionally required users to download special software and learn a difficult…

Five 3D virtual environments for the enterprise

Five 3D virtual environments for the enterprise

Immersive virtual environments — such as Second Life and some enterprise-friendly alternatives — have traditionally required users to download special software and learn a difficult…

iPads storm the enterprise

iPads storm the enterprise

As global accounts director at Altus, Inc., Michelle Klatt’s job is to visit Fortune 500 companies and demonstrate her firm’s video management software. When the…

Five iPad Safety Tips

Five iPad Safety Tips

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks,…

dummy-img

OppenheimerFunds gets return on investment from Agile, SOA

OppenheimerFunds used to have a data entry efficiency problem. Address changes that customers made on its Web site had to be manually re-entered into a…

dummy-img

Visa issues 10 ‘commandments’ for online merchants

In an attempt to reduce online credit-card fraud, Visa U.S.A. in San Francisco announced 10 “commandments” for online merchants to guard its cardholders’ information. And,…

dummy-img

Fake bank Web sites trick consumers into giving up personal data

A hacker doesn’t have to break into a bank’s computer to steal account numbers and access codes. It may be enough to set up a…