Blog

IBM Selected to Manage First Phase of New York City’s Data Center Consolidation and Modernization Program

*Project to Streamline IT Infrastructure to Improve Service Delivery, Reduce Energy Consumption and Strengthen Security*

NEW YORK, N.Y. – 31 Jan 2011: IBM today announced that it has been selected by the City of New York to build a more efficient, smarter technology platform for CITIServ, the City’s IT infrastructure modernization program.  The goal of the project is to streamline delivery of City services by consolidating and updating outdated and incompatible IT, thereby reducing energy consumption, strengthening security, and providing City workers with faster access to the latest technologies. (more…)

Read More

Non-Alcoholic Energy Drinks May Pose ‘High’ Health Risks

*Researchers Recommend Public and Private Action* 

COLLEGE PARK, Md. – Highly-caffeinated energy drinks – even those containing no alcohol – may pose a significant threat to individuals and public health, say researchers at the University of Maryland School of Public Health and Wake Forest University School of Medicine. 

In a new online commentary in the Journal of the American Medical Association (JAMA), they recommend immediate consumer action, education by health providers, voluntary disclosures by manufacturers and new federal labeling requirements.  (more…)

Read More

Hardware, Software Advances Help Protect Operating Systems From Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer – or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked.

At issue are security attacks in which an outside party successfully compromises one computer application (such as a Web browser) and then uses that application to gain access to the OS. For example, the compromised application could submit a “system call” to the OS, effectively asking the OS to perform a specific function. However, instead of a routine function, the attacker would use the system call to attempt to gain control of the OS. (more…)

Read More

NASA Comet Hunter Spots Its Valentine

NASA’s Stardust spacecraft has downlinked its first images of comet Tempel 1, the target of a flyby planned for Valentine’s Day, Feb. 14. The images were taken on Jan. 18 and 19 from a distance of 26.3 million kilometers (16.3 million miles), and 25.4 million kilometers (15.8 million miles) respectively. On Feb. 14, Stardust will fly within about 200 kilometers (124 miles) of the comet’s nucleus. (more…)

Read More