One of the most popular engines for searching for movies and music distributed via BitTorrent has been ordered to remove links to illegally shared content, marking a victory for the entertainment industry.
MySQL architect Brian Aker discusses the future of database storage engines, Amazon's Web services, the next generation of distributed revision control and the economics of creating open source software.
The distributed approach to projects at Toronto-based engineering firm Morrison Hershfield Corp. is markedly different from the on-premise, single-office tack of previous years. A recent move to unified communications technology has eliminated a monthly $3,000 conference call bill and allowed the firm to harness internal talent.
The University of California at Berkeley Friday disclosed that hackers broke into restricted computer databases in the campus health-services center, as the university began notifying current and former Berkeley students their personal information may have been taken.
Husband and wife owners of a California company that distributed pornographic materials over the Internet have been each sentenced to one year and one day in prison, the U.S. Department of Justice announced.
Check fraud is an old-fashioned kind of crime, but a criminal ring with ties to Russia is using modern cybercrime techniques, including botnets, online databases of financial information and check imaging archives, to run a highly automated, multi-million-dollar counterfeit-check operation.
As more organizations deploy Hadoop to analyze vast reams of information, they may find they need to transfer large amounts of data between Hadoop and their existing databases, data warehouses and other data stores. Now the volunteer developers behind a new connector designed to speed this data exchange have gotten the full support from the Apache Software Foundation (ASF).
Business information exists in a complex ecosystem, teeming with a multitude of technologies, regulatory requirements, standards, business processes, vendors, security threats, system vulnerabilities, and market pressures. This information moves through elaborate workflows across networks, multiple applications, databases, servers, and across political boundaries. In today's world, much of this information has to meet the three information security tenets: availability, integrity and confidentiality.
So with word circulating around the industry of a possible Cisco spin-in developing a cloudy switch for software-defined networking (SDN) and/or distributed data storage, what's the status of Cisco's "Jawbreaker" fabric switching project?
The websites of Indian government-run communications company Mahanagar Telephone Nigam and the Internet Service Providers Association of India faced DDoS (distributed denial of service) attacks from Anonymous on Wednesday as some Internet service providers continue to block file-sharing websites following a court order.
Security analysts scrambled to find a motive behind the distributed denial-of-service attacks that brought down Twitter for several hours, and also hit Facebook, Google and LiveJournal.
An infusion of social software is helping fuel an evolution of enterprise collaboration that will eventually give users more flexible and distributed tools for finding, organizing and sharing data, according to a conference of experts exploring the topic.
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.
Distributed denial of service and SQL injection are the main types of attack discussed on hacking forums, according to new research from security vendor Imperva.
Application Delivery Controllers (ADC) are critical to a smoothly functioning data center. They provide key functions including server load balancing, monitoring the health of servers and apps; protecting the data center from distributed denial-of-service attacks, performing SSL encryption and decryption; making servers more efficient by managing connections, running specialized application scripts and accelerating applications.
A Chinese developer of pornography filtering software protested reports linking the program to China's broader Internet censorship on Wednesday, after the government ordered that his software be distributed with all PCs sold in the country.