As seen in:

Our latest news and insights.

Microsoft Finds (Random) Way to Secure Vista

A security feature used in the open-source world is now helping to harden Windows Vista against buffer overrun exploits. Microsoft has quietly fitted the feature, called ALSR (Address Space Layout

The Battle to Tame Unstructured Data 2

It happens all too often: one of the 480 attorneys at the Los Angeles-based law firm Sheppard, Mullin, Richter & Hampton LLP pulls aside CIO Donna Paulson and asks her

Boost for Wireless LANs?

Bluesocket earlier this month introduced new wireless local-area network access point devices built on technology that the company says gives users greater coverage and capacity than existing products. The access

Symantec Plugs Anti-virus Worm Hole in Record Time

Working feverishly through the holiday weekend, Symantec’s security response team has completed patches for a “high-risk” worm hole in two enterprise-facing product lines. The flaw, which could allow malicious hackers

eWEEK Announces Sixth Annual Excellence Awards Winners

At a ceremony held in Boston on May 23, eWEEK proudlyannounced the winners in its sixth annual Excellence Awardsprogram. This year’s winners impressed the program judges—eWEEK Labsanalysts and eWEEK Corporate

Top Security Stories: What You Need to Know

Baseline‘s 5-Step Security Survival Guide How to develop and manage a world-class security infrastructure—and justify the investment to your bosses. No. 1: Detect the Initial Attack No. 2: Track Down

What the eBay-Yahoo Deal Means to Google

Google’s CEO Eric Schmidt thinks everybody’s getting it wrong about the recently announced blockbuster ad deal between Yahoo and online marketplace eBay. Schmidt argues it isn’t a blow to Google,

IBM Adds Muscle to Storage Virtualization

IBM introduced next-generation enhancements to its storage “virtualization engine” software May 25—improvements that help companies move large amounts of data over greater distances at higher speeds and across a number

Appeals Court Sides with Mac Rumor Sites

A three-judge appellate panel stated May 26 that bloggers can protect the anonymity of sources, reversing an earlier decision in the case of Apple Computer versus a group of owners

Baseline is an independent publication focused on the intersection of business and technology.

Our editors at Baseline work tirelessly to provide our readers with the most relevant and recent business technology information. We work with influencers and industry experts to help you implement technology into your business. 

Every technology solution we recommend has been vetted by our technology.

To maintain objectivity, we don’t accept sponsorships or commissions for promoting specific tech products or free services in exchange for favorable reviews. We provide unbiased opinions and expert insights to inform our audience.

We don't overlook long-term technology trends.

Your technology strategy should serve your business for years to come, which involves ongoing costs and updates. That’s why we don’t just focus on initial implementations. Instead, we gather first-hand data on the long-term expenses associated with maintenance fees, scalability requirements, and potential upgrade costs you can expect.

We are constantly getting better day by day.

We are committed to providing honest assessments – especially if a solution fails to meet expectations. Our publication is an independent technology resource that doesn’t accept payment for positive reviews.

We will tell you when a software isn't what it seems.

We continuously seek ways to enhance our analysis, from developing new benchmarks for software performance to upgrading our software assessment tools. If you’d like to suggest technology solutions or strategies we should evaluate or have any feedback for us, please reach out or join our online forum.