Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
October 09, 2007
09Oct2007
News
Switch upgrades and replacements
In this chapter of our guide to SAN expansion best practices, you'll learn about the physical limitations of switches, how to architect the switching infrastructure and how to find opportunities to deploy ISCSI. Continue Reading
-
October 09, 2007
09Oct2007
In Depth
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
October 09, 2007
09Oct2007
In Depth
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for ... Continue Reading
-
October 09, 2007
09Oct2007
News
Liverpool NHS Trust adopts single sign-on
Liverpool Women's NHS Foundation Trust is set to save £20,000 a year and about 30 minutes a day for each staff member by implementing a single sign-on system. Continue Reading
-
October 08, 2007
08Oct2007
News
The Tao of automated network management
Read or podcast this article about taking the first step toward an automated future by integrating network management tools. Continue Reading
-
October 08, 2007
08Oct2007
News
Happy Birthday to TechTarget ANZ
It's our birthday! Join us in wild celebration by remembering our most-read articles of times past. Continue Reading
-
October 08, 2007
08Oct2007
News
Happy Birthday to TechTarget ANZ
It's our birthday, so gift us with your presence and join us in recollection of our most read articles of recent times. Continue Reading
-
October 08, 2007
08Oct2007
News
Happy Birthday to TechTarget ANZ
It's our first birthday and we offer you the rather small present of a roundup of the most-read stories across our sites over the last month. Continue Reading
-
October 07, 2007
07Oct2007
News
IP telephony adoption rising, quality sagging
IP telephony adoption continues to grow, but service quality is lagging behind, according to a user survey from Psytechnics. Continue Reading
-
October 07, 2007
07Oct2007
In Depth
IP PBX eases VoIP transition for gas company
An IP PBX with Sip helped one gas company upgrade to a new phone system while also jumping into VoIP. Continue Reading
-
October 07, 2007
07Oct2007
News
Tool suites for identifying the problem -- from 'Network troubleshooting and diagnostics'
Learn network troubleshooting tool suites and their feature sets to support your technical troubleshooting activities. Continue Reading
-
October 05, 2007
05Oct2007
News
Podcast: the true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter and Martin believes newly trained IT ... Continue Reading
-
October 04, 2007
04Oct2007
News
Pillar announces support for 1 TB SATA drives
Pillar is one of the earliest to announce 1 TB SATA drives in an enterprise array. IBM's SVC becomes the first storage virtualization product certified with VMware. Continue Reading
-
October 04, 2007
04Oct2007
News
Dot Hill plots iSCSI, RAID 6 and midrange SANs
Money-losing vendor chases new OEM business with plans for IP SANS, better data protection and new midrange system. Continue Reading
-
October 04, 2007
04Oct2007
News
IP Multimedia Subsystem (IMS) lags mobile application delivery
IP multimedia subsystem (IMS) was supposed to provide convergence between fixed and mobile services, but new mobile applications have bypassed it. Continue Reading
-
October 03, 2007
03Oct2007
News
Network engineering applications -- from 'Network troubleshooting and diagnostics'
Network analysis applications, including protocol analysers, traffic generators, and simulation tools, can be used to understand how networks operate. Continue Reading
-
October 03, 2007
03Oct2007
News
Storage Basics Part 3: Getting the most out of iSCSI
The Storage Basics series continues, with a look at how to get the most out of iSCSI. Continue Reading
-
October 02, 2007
02Oct2007
News
Web 2.0 strategies for SMBs
Web 2.0 technologies are catching on at companies of all sizes. Find out how to make them work for your SMB with SearchSMB.com's top five Web 2.0 tips. Continue Reading
-
October 02, 2007
02Oct2007
News
IP address management -- from 'Network troubleshooting and diagnostics'
Learn how IP address management and maintenance tools can help manage the scope of IP addresses on your network. Continue Reading
-
October 02, 2007
02Oct2007
News
Storage Basics Part 2: What is iSCSI?
Day two of our storage basics special explains iSCSI. Continue Reading
-
October 01, 2007
01Oct2007
In Depth
San availability and reliability
This chapter outlines some of the techniques and tactics used to achieve high availability and redundancy in a San (FC or iSCSI). These can include port aggregation, trunking, and failover. Continue Reading
-
October 01, 2007
01Oct2007
In Depth
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
October 01, 2007
01Oct2007
News
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
October 01, 2007
01Oct2007
News
Developing good troubleshooting technique -- from 'Network troubleshooting and diagnostics'
The most important part of troubleshooting is technique. This excerpt examines several approaches such as Bottom-Up, Top-Down, and Divide-and-Conquer methods Continue Reading
-
October 01, 2007
01Oct2007
News
3Com to be acquired by equity firm
3Com has announced it will be acquired by private equity firm Bain Capital Partners for US$2.2 billion. Continue Reading
-
October 01, 2007
01Oct2007
News
UK will lead £13m study on electronic ID
The UK is to spearhead a £13m pilot project covering 13 European countries to test the interoperability of several electronic identity verification systems. This may eventually give citizens and businesses access to e-government services across the ... Continue Reading
-
October 01, 2007
01Oct2007
News
Storage Basics Part 1: What is Fibre Channel?
In the first part of a four-day feature, we explain basic storage technologies. Today: Fibre Channel. Continue Reading
-
September 27, 2007
27Sep2007
News
Pacific Hydro finds UTM improves its environment
Renewable energy company Pacific Hydro has found Watchguard's unified threat management devices make a valuable contribution to its defence in depth strategy. Continue Reading
-
September 26, 2007
26Sep2007
News
Presence capabilities open university help desk
Presence capabilities have helped one university ensure that calls into its help desk reach the person with the right set of skills. Continue Reading
-
September 26, 2007
26Sep2007
News
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review. Continue Reading
-
September 25, 2007
25Sep2007
News
How to purchase a data encryption product
Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products. Continue Reading
-
September 25, 2007
25Sep2007
News
Archive integration woes dog healthcare providers
Healthcare providers are getting up to speed with networked storage, but say integration of new storage systems with medical applications is still rocky. Continue Reading
-
September 25, 2007
25Sep2007
News
ITIL v3 Service Operation: FAQs on Book 4
ITIL expert David Pultorak answers common questions about the new ITIL Service Strategy Core Practice Book 1. Continue Reading
-
September 24, 2007
24Sep2007
News
Microsoft's OCS changing the face of VoIP?
Microsoft's OCS platform debuts soon, but will it bring about an industry shift to embedded communication applications as promised? Continue Reading
-
September 24, 2007
24Sep2007
News
Stock exchanges face IT challenge to prove ‘best execution’ under Mifid
In less than two months Europe's stock exchange technology will be put to the test when the Markets in Financial Instruments Directive (Mifid) brings new requirements for investment firms, including banks, insurers and hedge funds, to protect ... Continue Reading
-
September 24, 2007
24Sep2007
News
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. Continue Reading
-
September 23, 2007
23Sep2007
In Depth
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
September 20, 2007
20Sep2007
News
Australians more tech-aware
Telecommunications and the internet are becoming increasingly embedded in the lives of Australians, says an ACMA survey. Continue Reading
-
September 20, 2007
20Sep2007
News
NetScout acquires Network General
NetScout will acquire Network General, creating a one-stop shop for network management and monitoring tools. Continue Reading
-
September 20, 2007
20Sep2007
News
Unified communications an 'uphill battle' for Microsoft
Unified communications is going to be a tough sell for Microsoft, which is looking to eliminate the PBX and go all software. Continue Reading
-
September 20, 2007
20Sep2007
News
Wireless troubleshooting
Wireless network troubleshooting basics are discussed in this guide. Continue Reading
-
September 19, 2007
19Sep2007
In Depth
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading
-
September 19, 2007
19Sep2007
News
End-to-end network management enables reliable VoIP, unified communications
Monitoring voice quality, service availability, and security conditions are discussed in this Q & A with Gurmeet Lamba of Clarus Systems. Continue Reading
-
September 19, 2007
19Sep2007
News
802.11 protocols
802.11 wireless protocols and deployment basics are discussed in this guide. Continue Reading
-
September 18, 2007
18Sep2007
News
Cisco to acquire Cognio
Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility. Continue Reading
-
September 18, 2007
18Sep2007
News
Nokia to acquire mobile advertiser
Nokia has announced it has entered into an agreement to acquire mobile advertising and marketing company Enpocket for an undisclosed amount. Continue Reading
-
September 18, 2007
18Sep2007
News
Wireless security
Wireless security and polices are covered in this guide. Continue Reading
-
September 17, 2007
17Sep2007
Tip
Bringing the network perimeter back from the 'dead'
Many have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, says network security expert Mike Chapple. Continue Reading
-
September 17, 2007
17Sep2007
News
Wireless network deployment and management
Wireless network deployment and management are discussed in this guide. Continue Reading
-
September 17, 2007
17Sep2007
News
Wireless access points
The basics of wireless access point (AP) as well as configuration and placement are covered in this guide. Continue Reading
-
September 16, 2007
16Sep2007
News
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments. Continue Reading
-
September 16, 2007
16Sep2007
News
Storage Decisions Session Downloads: Data Protection and Backup Track (NYC 2007)
Making the backup process seamless and reliable is critical. This track covers the staple backup technologies such as disk and tape, but also has an eye on the litany of new technologies set to drastically alter the data protection landscape. ... Continue Reading
-
September 16, 2007
16Sep2007
News
Communications-as-a-service taking hold
Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system. Continue Reading
-
September 16, 2007
16Sep2007
News
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out. Continue Reading
-
September 16, 2007
16Sep2007
News
Wireless protocols learning guide
Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide. Continue Reading
-
September 16, 2007
16Sep2007
News
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager Express. Continue Reading
-
September 10, 2007
10Sep2007
News
Product Roundup: E-discovery
A look at some of the suppliers and products that make up the e-discovery market. Continue Reading
-
September 09, 2007
09Sep2007
News
VoIP, unified communications prompt new technologies, threats
Wireless voice servers and handsets, VoIP and unified communications threats, and licensing agreements constitute recent changes in the VoIP market. Continue Reading
-
September 09, 2007
09Sep2007
News
NetApp, HDS tout scaled-down disk arrays
New offerings are meant to take advantage of storage growth in the midmarket, but experts say the products will still probably appeal most to existing high-end users. Continue Reading
-
September 09, 2007
09Sep2007
News
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage. Continue Reading
-
September 07, 2007
07Sep2007
In Depth
Surviving e-discovery
It's been eight months since the Federal Rules of Civil Procedure were amended, and e-discovery rulings are all over the map, creating chaos for companies that must comply. Continue Reading
-
September 07, 2007
07Sep2007
News
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix. Continue Reading
-
September 07, 2007
07Sep2007
News
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned. Continue Reading
-
September 07, 2007
07Sep2007
News
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Continue Reading
-
September 06, 2007
06Sep2007
News
Learn all about SATA
This handbook offers three related SATA tips which compare SATA to SAS and SCSI and provides advice on striking the right balance between them. Continue Reading
-
September 06, 2007
06Sep2007
News
IDC: High-end storage stalls in second quarter
IDC reports a lull in high-end enterprise spending in its quarterly disk tracker, with new growth lower in the market; Seagate plans encrypted 1 TB disk drive for PCs. Continue Reading
-
September 06, 2007
06Sep2007
News
Citrix adds Web security with acquisition
Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing. Continue Reading
-
September 06, 2007
06Sep2007
In Depth
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment ... Continue Reading
-
September 06, 2007
06Sep2007
News
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months. Continue Reading
-
September 05, 2007
05Sep2007
News
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out. Continue Reading
-
September 05, 2007
05Sep2007
News
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes. Continue Reading
-
September 05, 2007
05Sep2007
News
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system. Continue Reading
-
September 04, 2007
04Sep2007
News
IT cheat sheets for all
They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz. Continue Reading
-
September 04, 2007
04Sep2007
News
NetApp files suit against Sun over ZFS
NetApp says Sun's ZFS violates its patents and seeks an injunction against its distribution, potentially putting Sun's storage business at risk. Update 9/6/07: Sun counterattacks. Continue Reading
-
September 04, 2007
04Sep2007
News
Cisco goes next generation with 802.11n
Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access. Continue Reading
-
September 02, 2007
02Sep2007
News
Wireless network security: Controlling secondary connections
Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured. Continue Reading
-
September 02, 2007
02Sep2007
News
Now the dust has settled on pornography filtering...
Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans. Continue Reading
-
August 31, 2007
31Aug2007
In Depth
User performs data storage U-turn
U-Store-It, a national self-storage company, decentralized its data centers, migrated data from SAN to DAS and de-clustered Exchange to simplify storage management. Continue Reading
-
August 31, 2007
31Aug2007
News
Cisco issues CallManager security update
Security flaws in Cisco CallManager and Unified Communications Manager could be exploited for cross-site scripting and SQL injection attacks, but a security update is available. Continue Reading
-
August 31, 2007
31Aug2007
News
Suncorp reveals five-year VoIP plan
Financial services group Suncorp explains its plans to IP-enable its operations to Adam Turner. Continue Reading
-
August 30, 2007
30Aug2007
News
Network access control vendors: Attraction vs. retention
Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis. Continue Reading
-
August 30, 2007
30Aug2007
News
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia. Continue Reading
-
August 30, 2007
30Aug2007
News
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system. Continue Reading
-
August 29, 2007
29Aug2007
News
IMS, FMC on telecom carrier roadmaps
IMS and FMC are top of the to-do lists of service providers trying to differentiate themselves from the competition, according to an Infonetics Research study. Continue Reading
-
August 29, 2007
29Aug2007
News
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology. Continue Reading
-
August 29, 2007
29Aug2007
In Depth
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
August 28, 2007
28Aug2007
News
Unified communications slow to change U.S. work culture
Unified communications implementation is still high, but many enterprises have yet to allow users all its advantages. Continue Reading
-
August 28, 2007
28Aug2007
News
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be ... Continue Reading
-
August 28, 2007
28Aug2007
News
VoIP, unified communications study reveals challenges
VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by convergence. Continue Reading
-
August 28, 2007
28Aug2007
News
VoIP, unified communications study reveals challenges
VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by convergence. Continue Reading
-
August 28, 2007
28Aug2007
News
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. Continue Reading
-
August 27, 2007
27Aug2007
News
VoIP, unified communications study reveals challenges
VoIP and unified communications deployments can affect other applications. A recent study by Network General highlighted some of the challenges introduced by convergence. Continue Reading
-
August 27, 2007
27Aug2007
News
VoiceCon Fall 2007: Unified communications still has barriers
Unified communications (UC) offers streamlined communication, but significant challenges still need to be addressed. Continue Reading
-
August 26, 2007
26Aug2007
News
What is considered best practices in terms of backup vaulting (offsite storage) frequency?
As a consultant, this is something that I run into frequently. There seems to be a belief that if you're a smaller shop or smaller business: You don't have a lot of data, and you don't need to send your data offsite very often. A lot of times, the ... Continue Reading
-
August 26, 2007
26Aug2007
News
IBM back in iSCSI SAN fray
IBM is looking to take on HP's MSA and EMC's AX150, as well as EqualLogic and LeftHand, with a new iSCSI SAN product OEMed from LSI. Continue Reading
-
August 23, 2007
23Aug2007
News
Nokia Intellisync boosts device management
Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities. Continue Reading
-
August 23, 2007
23Aug2007
In Depth
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
August 22, 2007
22Aug2007
News
Nokia Intellisync boosts device management
Nokia Intellisync has updated its mobile device management portfolio. Continue Reading
-
August 22, 2007
22Aug2007
News
Australian telecoms growth predicted to fall
Research consultancy BuddeComm has predicted the Australian telecoms market will grow just 2.8% in the 2008 financial year to $36.3 billion, driven predominantly by data and broadband services. This is down from the 3.1% estimated this financial ... Continue Reading
-
August 22, 2007
22Aug2007
News
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. Continue Reading