In 2014, Hewlett-Packard announced a partnership with contract manufacturer Foxconn to build open, low-cost servers for cloud environments that would enable the tech giant to push back at the encroachment of white-box server models in the data center.
On March 10, HP unveiled the first fruits of the Foxconn partnership, announcing a new family of basic, low-cost servers under the Cloudline name.
The new servers offer alternatives to the company’s proprietary line of ProLiant systems and embrace standards developed within the Open Compute Project, an effort started in 2011 by Facebook to develop ways to create more power-efficient, cost-effective data center hardware.
Dell officials on March 10 rolled out the Dell Data Protection/Endpoint Security Suite, a single offering that can be used with commercial systems from Dell or other hardware makers that offers an array of authentication, encryption and threat protection capabilities.
Dell over the past several years has been working to build out its security capabilities, both through in-house development and through acquisitions of such companies as SecureWorks, SonicWall, Quest and Credant Technologies with the goal of becoming a complete IT solutions provider.
A reported plan by Google to develop a new version of Android for virtual reality headsets is the latest sign of the growing interest in this market among major technology vendors.
The Wall Street Journal on Friday reported that Google has already assembled a secret team of “tens of engineers” to develop a new version of its mobile operating system, dubbed Android VR, which it will distribute for free to headset makers.
The Android VR team was assembled in the wake of Facebook’s surprise $2 billion purchase of VR technology Oculus in March 2014.
Software maker Adobe launched a Web application vulnerability disclosure program, inviting security researchers to submit bugs found in its Web properties, but has declined to pay out rewards for high-severity bugs.
The program, announced on March 4, gives researchers guidelines for testing Adobe properties and highlights eight categories of Web application weaknesses on which bug hunters should focus, such as cross-site scripting, cross-site request forgery in a privileged context and injection vulnerabilities.