[A report by UK Networking company Black Box, has shown a significant increase in the number of organisations using the Internet while the adoption of ATM appears to be on the decline. IFF Research, which surveyed 1,220 networking professionals on behalf of Black Box during October and November last year, showed that since 1995, the number of companies that have an Internet connection has nearly doubled from 38% in 1995 to 70% in 1997. Only 3% of companies surveyed said they had no plans to connect to the Internet. More than 60%of those with personal access at work are connected via a LAN with 32% of those using ISDN. 32% were connected via a 64Kbps leased line and only 29% via a 2Mb+ leased line. Despite the Internet's increasing acceptance in the corporate arena only 20% of companies with a Web site accept orders over it, and although 16% said more than 5% of their business was generated by their Web site, only 6% accepted payment over it. Security fears, fuelled by high profile breaches over the last 18 months has prompted significant growth in the use of firewalls: 48% of all organisations now use a firewall compared to 37% in April 1997 but 9% of the companies with firewall protection said they had been breached in the last year. But it was the adoption, or rather lack of adoption, of ATM that provided the most interesting reading in the survey. While 25% of respondents said they were evaluating ATM in April 1997 only 13% were doing the same in November. 52% said they had rejected ATM altogether marking a return to the pre-hype figures of January 1996. Gigabit Ethernet on the other hand was rejected by only 24% of respondents with 2% actually having the yet-to-arrive technology installed.
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software