• VeriSign Agrees To Suspend Search Service

    The Internet's key traffic cop bowed to pressure Friday and agreed to suspend a new online search service blamed for such side effects as disabling junk e-mail filters and networked printers.

  • BizTalk 2004 Will Boost Development Capabilities

    BizTalk Server 2004 Beta, part of Microsoft's Jupiter initiative, will be offered next year in combination with Content Management Server and Commerce Server. That's good news for developers because BizTalk 2004 offers far more development capabilities than the previous version.

  • Cisco, Huawei Near Settlement

    Cisco Systems last week took a step toward settling its patent-infringement lawsuit against Chinese networking vendor Huawei Technologies by agreeing to temporarily halt litigation.

  • Partners: HP Reps Dictating Margin

    Kevin Gilroy, Hewlett-Packard's vice president and general manager of commercial channels in the Americas, last week pledged to stop HP field reps from dictating profit margins on products after vociferous complaints from several partners at Ingram Micro's VentureTech Network conference.

  • Custom Notebooks

    Toshiba is quietly rolling out a plan to provide solution providers with custom-developed, exclusive notebook configurations on a case-by-case basis, a move that seeks to carve into Dell's market share.

  • Fujitsu Bundles Play To Distributed Scanning In SMBs

    Distributed scanning is gaining momentum,good news for Fujitsu Computer Products of America, whose imaging division accounted for one-third of all departmental scanners sold last year, according to InfoTrends Research Group.

  • Home Synthesis

    After working as an IT solution provider for several years, Corbin Hambrick jumped on the home integration bandwagon two years ago, before most solution providers even saw it looming on the horizon. Although his IT experience helped with the switch, Hambrick noted that there was still a lot he had to learn about the new market.

  • Network Associates Detects Intrusions

    Protecting enterprise networks from intruders and attacks has been one of the most costly and time-consuming functions for administrators and solution providers to perform. Furthermore, the constant threats of denial-of-service attacks and Internet worms add an additional level of complexity to the equation.