Much has been written about the Conficker worm, also called “Downadup,” in recent days. eWEEK has pulled together some general advice for protecting your systems from infection and remediating them should the worm slither by your defenses.
Messaging and collaboration SAAS company Zoho updates its Firefox plug-in for Zoho Notebook to make it easy to import a Google Notebook to Zoho’s cloud computing environment. The move is a shrewd one on the part of Zoho, which is looking to find favor with peeved Google users put off by Google Notebook’s newly halted application development. Any content added to the new Zoho plug-in will be automatically synchronized with the online version of Zoho Notebook.
DiVitas Networks’ newest mobile UC platform moves beyond the usual fixed mobile convergence features to include secured instant messaging, presence and visual voicemail. Such features made up for a disappointing set-up experience.
ContentWatch’s CP 300 security appliance offers very good content filtering, traffic shaping and anti-malware capabilities, as well as excellent reporting. It also integrates with directory services such as LDAP to let businesses enforce Internet usage policy per person.
With the proliferation of WLANs in businesses and homes, the need to plan and police wireless networks is growing. The MetaGeek Wi-Spy DBx USB device and accompanying Chanalyzer 3.1 software simplify sophisticated spectrum study for the masses.
Novell ZENworks Application Virtualization does a good job of virtualising software on Microsoft Windows desktop PCs. It is also a worthy competitor to Symantec Altiris SVS, Microsoft Application Virtualization and VMware ThinApp 4.
Some enterprise VoIP systems are all but unusable from the time they are implemented because nobody took the time to properly profile the existing network. Before implementing a VoIP system, take into account these five critical steps to ensure success.