Microsoft ratcheted up its product support for SQL Server 2005 by releasing Service Pack 3 (SP3) on Monday, along with SP3 Cumulative Update 1.
- By Herb Torrens
- December 16, 2008
Microsoft will end 2008 with a "critical" out-of-cycle patch for IE, according to an advance notification issued Tuesday for a new security update slated for release on Dec. 17.
- By Jabulani Leffall
- December 16, 2008
Cisco's 2008 Annual Security Report report highlighted the increasing sophistication of Internet-based attacks, largely because cyber-criminals themselves are becoming increasingly sophisticated.
- By Stephen Swoyer
- December 16, 2008
The Professional Association for SQL Server (PASS) on Monday unveiled a limited private community technology preview (CTP) of "SQL Server Application and Multi-Server Management [tools], as part of the SQL Server codename 'Kilimanjaro,'" according to a PASS spokesperson.
- By Kurt Mackie
- December 15, 2008
A zero-day flaw in Internet Explorer 7 reported last week has sparked increased hacker activity, and now the attacks involve most versions of Microsoft's Internet browser.
- By Jabulani Leffall
- December 15, 2008
Microsoft Live Labs announced on Saturday that its Seadragon Mobile graphical user interface (GUI) is now available for the Apple iPhone as a technical preview release, but Windows Mobile users will have to wait to get it.
- By Kurt Mackie
- December 15, 2008
DataDirect Technologies this week upgraded its ADO.NET database drivers, which provide connectivity between .NET-based applications and DBMSes from Oracle, IBM, Microsoft and Sybase.
- By Jeffrey Schwartz
- December 12, 2008
Google is exploring a way to run code fast and natively in a Web browser without worrying about security issues.
- By Jim Barthold
- December 11, 2008
Digital identity pioneer and open source entrepreneur Dick Hardt will join Microsoft as partner architect, according to his "Identity 2.0" blog on Tuesday.
- By Herb Torrens
- December 11, 2008
VMware will expand its strategic relationship with Hewlett-Packard to include the joint development of software that manages datacenter resources.
- By Rutrell Yasin
- December 11, 2008
Internet Explorer 8 -- Microsoft's latest release, currently at the Beta 2 stage -- was declared to be the safest but the least popular browser, according to a browser security survey.
- By Jabulani Leffall
- December 11, 2008
Web developers have traditionally kept multiple browsers on their computers to facilitate testing, but a fairly new Japanese-made experimental browser called Lunascape rolls the three most important engines into one.
- By Will Kraft
- December 11, 2008
The United States has the dubious distinction of hosting the most infected sites and having the most compromised computers relaying spam.
- By William Jackson
- December 10, 2008
Microsoft once again has to contend with "Exploit Wednesday." This time, the problem is a zero-day IE 7 flaw discovered soon after the Patch Tuesday release.
- By Jabulani Leffall
- December 10, 2008
Recently, I read about NexentaCore, a new experimental operating system that seeks to merge the functionality of a Linux user environment with the OpenSolaris OS kernel, supporting the ZFS file system.
- By Will Kraft
- December 10, 2008
Microsoft server and tools exec Bob Kelly told an investment banker audience how Microsoft plans to take advantage of opportunities in the enterprise IT market.
- By Kurt Mackie
- December 10, 2008
December's Patch Tuesday will be a historic security update release. But it won't be because of the size and scope of the eight patches.
- By Jabulani Leffall
- December 09, 2008
The silicon industry's plans to use multiple processor cores on the same chip to improve computer processing performance may have hit a bump on supercomputing highway.
- By Jim Barthold
- December 09, 2008
According to a new survey from business intelligence (BI) specialist Actuate Corp., open source software (OSS) doesn't simply have a token presence in the enterprise; it has truly arrived.
- By Stephen Swoyer
- December 09, 2008
Enterprise architecture must be a key part of the strategy used to protect computers and networks from cyberattacks, said Ron Ross, a National Institute of Standards and Technology senior computer scientist.
- By Doug Beizer
- December 09, 2008