Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2006 Stories
-
October 26, 2006
26Oct2006
News
IT greats: Top 10 greatest IT people
For every world-famous name with a world famous fortune – think Bill Gates, Steve Jobs and Michael Dell – there are hundreds of other individuals who have moved the IT industry and its technology inexorably forward Continue Reading
-
October 25, 2006
25Oct2006
News
Cisco launches mega videoconferencing system
Cisco Systems Inc. has talked about TelePresence and demonstrated it, and now it's finally something enterprises can buy, but at six figures it's a high price to pay. Continue Reading
-
October 25, 2006
25Oct2006
News
Video, audio are network drains
Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring. Continue Reading
-
October 25, 2006
25Oct2006
News
Sourcefire looking to go public
The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed. Continue Reading
-
October 25, 2006
25Oct2006
News
EMC shuffles channel deck
EMC announced on its earnings call earlier this month that it would be cutting management jobs as part of a round of 1,250 layoffs, and it looks like at least a couple of those positions have already gone from the channel group. Continue Reading
-
October 25, 2006
25Oct2006
News
Research shows massive botnet growth
Reports from McAfee and Microsoft show bot herders are gaining ground and threatening national infrastructure. Some suppliers hope to strike back by sharing resources. Continue Reading
-
October 24, 2006
24Oct2006
News
How does the service provider differentiate between data and VoIP as data?
For our mobile devices in trucks, we use GSM/GPRS communication. Our customers are paying for a certain data amount -- depending on the service package to which they subscribe. We use a modem in our device, which can do both data and voice. But as I... Continue Reading
-
October 24, 2006
24Oct2006
Tip
Capacity planning: Reclaim orphaned storage
This tip takes a look at how to maximize your storage capacity utilization by finding orphaned data and storage that can in turn be re-allocated for another productive use. Continue Reading
-
October 23, 2006
23Oct2006
News
What storage managers are buying and why, page 3
What storage managers are buying and why Continue Reading
-
October 23, 2006
23Oct2006
News
What storage managers are buying and why, page 7
What storage managers are buying and why Continue Reading
-
October 23, 2006
23Oct2006
News
Symantec patches AntiVirus Corporate Edition flaw
Attackers could exploit a flaw in Symantec AntiVirus Corporate Edition and Client Security to overwrite kernel addresses, crash machines and run malicious code. Continue Reading
-
October 23, 2006
23Oct2006
News
What storage managers are buying and why, page 2
-
October 23, 2006
23Oct2006
In Depth
What storage managers are buying and why, page 5
What storage managers are buying and why Continue Reading
-
October 23, 2006
23Oct2006
In Depth
What storage managers are buying and why, page 4
What storage managers are buying and why Continue Reading
-
October 23, 2006
23Oct2006
News
Comparing VoIP vendors
For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her "Ask-the-Expert" section. Carrie ... Continue Reading
-
October 23, 2006
23Oct2006
News
What storage managers are buying and why, page 6
What storage managers are buying and why Continue Reading
-
October 23, 2006
23Oct2006
News
Comparing VoIP vendors
For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her 'Ask-the-Expert' section. Carrie ... Continue Reading
-
October 23, 2006
23Oct2006
News
SATA boosts RAID 6 use
High-capacity SATA disks are driving up the use of RAID 6, which has prompted vendors to create new ways of overcoming the performance hit incurred with dual-parity protection. Continue Reading
-
October 23, 2006
23Oct2006
News
Security researcher, professor influences students for life
Dorothy Denning, a professor of defense analysis at the Naval Postgraduate School, has contributed to the field of data security. Her work earned her a Security 7 award. Continue Reading
-
October 23, 2006
23Oct2006
News
SDL expected to help fulfil Vista security promises
Windows Vista is expected to be the most secure Microsoft product released thanks to the company's implementation of the Security Development Lifecycle (SDL). Continue Reading
-
October 23, 2006
23Oct2006
News
QLogic dives into directors
QLogic will announce its new SanBox 9000 director this week, but it's missing true director-class features and is encroaching on a market already dominated by Brocade and Cisco. Continue Reading
-
October 23, 2006
23Oct2006
News
IT executives eager to exploit Web 2.0 wave
What good is a blog if no one reads it? IT managers find out and begin to make blogging and other Web 2.0 tools a more strategic part of their business. Continue Reading
-
October 23, 2006
23Oct2006
News
Boston Celtics face off against spyware
One of the Boston Celtics' toughest opponents was spyware until the IT shop fought back. The team's IT chief explains how he gained the upper hand. Continue Reading
-
October 22, 2006
22Oct2006
News
Information Security Decisions Session Downloads
Session Downloads from Information Security Decisions 2006 Conference. Continue Reading
-
October 22, 2006
22Oct2006
News
Enhanced Identity and Access Management
From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls. Continue Reading
-
October 22, 2006
22Oct2006
News
Snyder On Security: An insider's guide to the essentials
Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies. Continue Reading
-
October 22, 2006
22Oct2006
News
EMC plays catch-up with Clariion
Clariion arrays now have support for both Fibre Channel and iSCSI in one box, as well as other features that competitors have been using against EMC for some time. Continue Reading
-
October 19, 2006
19Oct2006
News
Xiotech, Pillar scale down, support iSCSI
Xiotech, Pillar introduce entry-level iSCSI arrays; Overland loses Dell deal; EMC and IBM report earnings. Continue Reading
-
October 18, 2006
18Oct2006
News
Rural Payments Agency project failed after IT system costs spiralled
Delays in implementing a bespoke IT system led to the Rural Payments Agency (RPA) failing to pay subsidies to farmers on time, according to a National Audit Office report. Continue Reading
-
October 17, 2006
17Oct2006
News
Am I out of luck if I have a "mixed" email system (e.g., Exchange and Notes)?
That's a "real-life" situation that we run into many times when we've gone out and worked with companies. We might be called in by a company that has both a Microsoft Exchange and a Notes/Domino email system and they want to tie an archive together,... Continue Reading
-
October 17, 2006
17Oct2006
In Depth
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
October 16, 2006
16Oct2006
In Depth
Strategy clinic: Deciding which activities to measure to provide meaningful insights
I have always believed in 'doing' rather than self-monitoring, but reluctantly agree that the IT department needs to provide meaningful metrics on its activities. We have no shortage of things to measure, but how do we decide which are the most ... Continue Reading
-
October 16, 2006
16Oct2006
News
Ray Noorda, the pioneer behind rise of Novell, dies
Network computing pioneer and former Novell chief executive Ray Noorda has died aged 82. Continue Reading
-
October 16, 2006
16Oct2006
News
Oracle fixes 101 flaws
Attackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws patched and their severity. Continue Reading
-
October 16, 2006
16Oct2006
In Depth
Nmap Technical Manual
By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in ... Continue Reading
-
October 16, 2006
16Oct2006
News
Security Bytes: Flaws fixed in Bugzilla
Meanwhile, security holes are also plugged in Cisco's Wireless Location Appliance software and Clam AntiVirus. Continue Reading
-
October 16, 2006
16Oct2006
News
Cisco ramps up unified communications tools
Cisco last week released a host of new products to enhance its suite of unified communications tools, including an IP phone that's easier for end users to accept. Continue Reading
-
October 15, 2006
15Oct2006
Tip
Creating a WPA2 compliant network
Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network. Continue Reading
-
October 15, 2006
15Oct2006
Tip
High-gain antennas and the near field effect
In this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is. Continue Reading
-
October 15, 2006
15Oct2006
Tip
Wireless connection in the wilderness
Lisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain. Continue Reading
-
October 15, 2006
15Oct2006
News
Microsoft caves to pressure over Vista security
To accommodate third-party security vendors and appease antitrust regulators in Europe, Microsoft will make some final tweaks to Windows Vista. Continue Reading
-
October 15, 2006
15Oct2006
News
Flaw found in Toshiba wireless device driver
Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. Continue Reading
-
October 15, 2006
15Oct2006
News
Sun goes back to its roots with Honeycomb user
Stanford University is the first official Honeycomb customer; it will be using the programmable storage archive for its massive Google library project. Continue Reading
-
October 12, 2006
12Oct2006
News
Microsoft to fold security into Windows division
The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista. Continue Reading
-
October 12, 2006
12Oct2006
In Depth
Security Blog Log: Taking Google Code Search for a spin
This week, the blogosphere is buzzing about Google Code Search. Despite concerns that the tool will aid attackers, some see it as a boost for security. Continue Reading
-
October 12, 2006
12Oct2006
News
What to do when your server goes down
When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it. Continue Reading
-
October 12, 2006
12Oct2006
News
Sprint spin-off struggles with mainframe tape migration
Telecom firm Embarq touched a nerve with mainframe users at StorageTek Forum -- huge tape migrations are forcing them to reconsider their historic loyalty to tape. Continue Reading
-
October 11, 2006
11Oct2006
News
Brief: Malicious Web site poses as Google
A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content. Continue Reading
-
October 11, 2006
11Oct2006
News
Does Spanning Tree Protocol have an adverse effect on VoIP?
Do you know if Spanning Tree has an adverse effect upon VoIP? If so, what is the best way to provide LAN-based switch redundancy to VoIP gateways? Continue Reading
-
October 11, 2006
11Oct2006
News
Briefs: VoIP management; mobile E911; and Windows 2003 support
Qovia releases its new VoIP management system; 911 Enable made E911 mobile and Codima announced support for Windows 2003 server. Continue Reading
-
October 11, 2006
11Oct2006
News
Sun clarifies disk storage strategy
Sun execs at StorageTek Forum say they plan to keep (but streamline) most of the disk storage portfolio -- but did not deny rumors about plans to sell off the 6920 array. Continue Reading
-
October 10, 2006
10Oct2006
In Depth
Inside MSRC: Public vulnerability disclosures on the rise
Even though irresponsible publicly disclosed vulnerabilities seem to be on the rise, Microsoft's Christopher Budd discusses how the software giant was able to quickly release a fix for the recent VML flaw, plus offers best practices on how to make ... Continue Reading
-
October 10, 2006
10Oct2006
News
McAfee CEO Samenuk retires in wake of options probe
The investigation into stock option grants is complete and company president Kevin Weiss has been fired, as well. Continue Reading
-
October 10, 2006
10Oct2006
News
Google Code Search gives security experts a sinking feeling
The new search tool from Google can help developers find useful code examples. But security experts worry that it also will make attackers' jobs that much easier. Continue Reading
-
October 09, 2006
09Oct2006
News
Banking on the future
As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector? Continue Reading
-
October 09, 2006
09Oct2006
News
Isilon adds snapshots, makes play for mainstream NAS
Users and analysts say Isilon's new snapshot features are a challenge to NetApp, but the NAS cluster specialist still has a way to go to compete in the enterprise. Continue Reading
-
October 09, 2006
09Oct2006
News
Midmarket IT pros have NAC for identity, access management
Midmarket firms may not have the budgets of large companies, but IT pros can build identity and access management programs that are as effective as what the big guys have. Continue Reading
-
October 09, 2006
09Oct2006
News
Symantec unveils Security 2.0 initiative
As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft. Continue Reading
-
October 05, 2006
05Oct2006
Tip
Minimum and maximum Ethernet frame sizes
In this Q&A, Lindi Horton answers the question "What is the minimum and maximum size of an Ethernet frame that carries an IP packet which in turn carries an ICMP packet?" Continue Reading
-
October 04, 2006
04Oct2006
News
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ... Continue Reading
-
October 04, 2006
04Oct2006
Tip
Link and port aggregation information
Need some clarification on link and port aggregation? Here, our expert, Lindi Horton, provides us with just that in this Q&A. Continue Reading
-
October 04, 2006
04Oct2006
Tip
Troubleshooting your network
In this Q&A, our expert, Lindi Horton, helps with troubleshooting a network that has problems staying up in the evening. Continue Reading
-
October 04, 2006
04Oct2006
News
ISCSI gains strength from servers
More powerful servers are helping ease some performance concerns for users considering IP SANs, but others say they still want to see more improvement. Continue Reading
-
October 03, 2006
03Oct2006
In Depth
School district expels outsourced backup, enrolls CDP
Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product. Continue Reading
-
October 03, 2006
03Oct2006
In Depth
Test your IQ: Business continuity -- ANSWER
This type of plan specifies a means of maintaining essential services at the crisis location. Continue Reading
-
October 03, 2006
03Oct2006
News
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
-
October 03, 2006
03Oct2006
Tip
The most commonly used network operating system
In this Q&A, Lindi Horton answers the question "What network operating system is more currently and commonly used?" Continue Reading
-
October 03, 2006
03Oct2006
News
3Com rolls out unified SMB switch
3Com hit the market today with an all-in-one unified switch for SMBs. Continue Reading
-
October 03, 2006
03Oct2006
News
Alliance and Leicester to overhaul core systems
Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme. Continue Reading
-
October 03, 2006
03Oct2006
News
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
-
October 03, 2006
03Oct2006
Opinion
NHS IT - A personal view
The media last week was full of comment on the "problems" at the NHS IT project as Accenture ducked out. Yet again, the comment portrayed the project as a "disaster" - indeed “yet another public sector IT disaster”. Continue Reading
-
October 02, 2006
02Oct2006
In Depth
DPM's Diary: 3 October 2006
Monday Continue Reading
-
October 02, 2006
02Oct2006
Tip
Convincing management to approve your networking project
Network pros must have great technology know-how, coupled with major league pitching abilities. This list of project dos and don'ts can help you over your managers. Continue Reading
-
October 02, 2006
02Oct2006
News
Cisco brings video to the enterprise
With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise. Continue Reading
-
October 02, 2006
02Oct2006
Tip
How to prevent former employees and administrators from accessing your server
What do you do if you have ex-employees or even ex-administrators accessing your server remotely? How do you prevent them from doing this? Our expert, Lindi Horton, can tell you how. Continue Reading
-
October 02, 2006
02Oct2006
In Depth
Alliance and Leicester to overhaul core systems
Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme. Continue Reading
-
October 02, 2006
02Oct2006
News
Cisco brings video to the enterprise
With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise. Continue Reading
-
October 02, 2006
02Oct2006
In Depth
ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago. Continue Reading
-
October 01, 2006
01Oct2006
News
Column: The myths and realities of VoIP security
Security is often cited as one of the primary reasons organizations have not deployed VoIP. The biggest VoIP security threat is not making headlines. Zeus Kerravala, Yankee Group analyst, cuts through the hype so network managers can maximize the ... Continue Reading
-
October 01, 2006
01Oct2006
News
New exploits target Microsoft's PowerPoint, IE
Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint. Continue Reading
-
September 30, 2006
30Sep2006
In Depth
PING with Suzanne Hall
In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure. Continue Reading
-
September 28, 2006
28Sep2006
News
Top tech tips from SearchStorage.com
Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com. Continue Reading
-
September 28, 2006
28Sep2006
In Depth
More from SearchSecurity September 2006
This month's round up weighs the pros and cons of security information management systems (SIMs) plus four case studies illustrating the different roadblocks security managers can encounter Continue Reading
-
September 27, 2006
27Sep2006
In Depth
On privacy laws, every state is one of confusion
It's getting increasingly difficult for US firms to comply with regulations . David A. Meunier feels that it's time to develop safeguards and processes for this ever-changing regulatory environment. Continue Reading
-
September 27, 2006
27Sep2006
In Depth
Top 5 free Windows security downloads
The place where you can find free tools that help you crack passwords, remove troublesome spyware and enhance network security. Check out our five most popular tools and find out what you've been missing. Continue Reading
-
September 27, 2006
27Sep2006
Tip
Does having a CCNA and MCSE equal a higher-paying job?
David Minutella answers the question, "How helpful will it be if I get a CCNA certificate or MCSE certificate to fetch a high-paying job?" Read on to see our expert's response. Continue Reading
-
September 27, 2006
27Sep2006
Tip
Find the right work path in the field of IT
Our expert, David Minutella, answers the question of what path in IT is the right one. Continue Reading
-
September 27, 2006
27Sep2006
News
Users say keeping it simple means keeping one vendor
Despite some potential benefits of heterogeneous shops, users at Storage Decisions say they find sticking with one vendor a better way to survive the storage sprawl. Continue Reading
-
September 26, 2006
26Sep2006
News
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services' Continue Reading
-
September 26, 2006
26Sep2006
News
Stration worm targets Windows machines
The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments. Continue Reading
-
September 26, 2006
26Sep2006
News
Burton Group: Web application firewall market maturing
Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report. Continue Reading
-
September 25, 2006
25Sep2006
In Depth
Symantec Dark Vision app monitors underground IRC servers
New research project keeps tabs on the hacker underground, providing new insight on activities like credit card theft and spamming. Continue Reading
-
September 25, 2006
25Sep2006
News
Open source router on par with Cisco, users say
To avoid paying top dollar for Cisco routers, two users say Vyatta's Open Flexible Router is a viable alternative to the proprietary norm, with pluses and minuses, of course. Continue Reading
-
September 25, 2006
25Sep2006
News
ISCSI gets a boost from InfiniBand
The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI storage. Continue Reading
-
September 25, 2006
25Sep2006
News
IP telephony unites New Orleans nonprofit after Katrina
Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution Continue Reading
-
September 25, 2006
25Sep2006
News
IT pros worried about unsecured devices
IT admins keep working to make networks secure even as more unsecured personal gadgets their way into companies. Continue Reading
-
September 24, 2006
24Sep2006
News
Hijacked consumer machines target the enterprise
Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price. Continue Reading
-
September 24, 2006
24Sep2006
In Depth
NetApp operations chief talks growth
Tom Georgens, executive vice president and general manager at NetApp -- also rumoured to be in the running as next CEO -- discusses what's driving its growth. Continue Reading
-
September 24, 2006
24Sep2006
News
Cisco bulks up data center switching
Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community. Continue Reading
-
September 24, 2006
24Sep2006
News
Apple fixes Mac Wi-Fi flaws
Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines. Continue Reading