Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
February 11, 2007
11Feb2007
News
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy. Continue Reading
-
February 11, 2007
11Feb2007
News
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ... Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco VoIP management guide: VoIP management lifecycle
VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements. Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco VoIP management guide: Enterprise VoIP management solutions
Enterprise VoIP management solutions require two considerations: the scale of production environment and the need to extend support resources with a systems integrator or service provider. Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco VoIP management guide: Cisco requires proactive management
Managing Cisco VoIP solutions means network managers must rely on credible, experienced vendors to some extent. Fortunately, many vendors have emerged as trusted, viable partners that can offer an end-to-end management solution for Cisco VoIP ... Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ... Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco management guide: Selecting a VoIP solution
Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products. Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco VoIP management guide: Recommendations and summary
Enterprises now have solid choices of management solutions for their Cisco VoIP deployment. The short list for any enterprise should include Prognosis, Infovista, or Cisco. Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco management guide: Selecting a VoIP solution
Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products. Continue Reading
-
February 10, 2007
10Feb2007
News
Cisco VoIP management guide: Recommendations and summary
Enterprises now have solid choices of management solutions for their Cisco VoIP deployment. The short list for any enterprise should include Prognosis, Infovista, or Cisco. Continue Reading
-
February 08, 2007
08Feb2007
News
Roundup: Vista security, breakability touted at RSA Conference
At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking. Continue Reading
-
February 08, 2007
08Feb2007
News
New storage IPOs report losses
Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies. Continue Reading
-
February 07, 2007
07Feb2007
News
Download SAN Guide Chapter 1: Management (PDF)
You asked for it, so here it is -- a printable version of our SAN All-In-One Guide. Download Chapter 1: Management in .pdf format now. Continue Reading
-
February 07, 2007
07Feb2007
News
VoIP capabilities save hotel money, keep guests connected
"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities. Continue Reading
-
February 07, 2007
07Feb2007
News
Briefs: Vulnerabilities found in Trend Micro, Firefox browser
This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws. Continue Reading
-
February 07, 2007
07Feb2007
News
EMC plans array-based encryption via PowerPath
EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage. Continue Reading
-
February 07, 2007
07Feb2007
News
VoIP security, unified communications need questioned
VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies. Continue Reading
-
February 07, 2007
07Feb2007
News
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Part two of our series on securing the OSI stack looks at the perils of Address Resolution Protocol. Continue Reading
-
February 06, 2007
06Feb2007
News
IP storage adoption plows ahead bringing tangible benefits
According to IDC, there were 32,124 terabytes (TB) of iSCSI storage deployed worldwide in 2005. That figure had almost tripled to 97,506 TB by 2006. IDC expects that figure to triple again in 2007 to over 320,000 TB of iSCSI storage, with almost 4 ... Continue Reading
-
February 06, 2007
06Feb2007
News
Attackers hit computers that manage Internet traffic
Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage. Continue Reading
-
February 06, 2007
06Feb2007
News
VoIP predictions for 2007: Best bets from VoIP experts
How will the VoIP and networking markets evolve over 2007? SearchVoIP experts, Carrie Higbie and Juan Pablo Pazos, and our valued site members, put their cards on the table about the 2007 VoIP market and other important networking trends. Continue Reading
-
February 05, 2007
05Feb2007
News
What are the disadvantages of unified storage over independent block and file systems?
There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data and block-based data is significantly different... Continue Reading
-
February 05, 2007
05Feb2007
News
Is there any reliability difference with unified storage?
There are a few minor differences, but usually not a significant difference... Continue Reading
-
February 05, 2007
05Feb2007
News
CA backup bug exploitable on Vista
In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ... Continue Reading
-
February 05, 2007
05Feb2007
News
Will all storage systems be unified storage in the future?
I don't think that "all" storage systems will be unified... Continue Reading
-
February 05, 2007
05Feb2007
News
What does unified storage really mean?
This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a single storage system that can support both file and block access... Continue Reading
-
February 05, 2007
05Feb2007
News
What is the advantage of having unified storage?
There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based access or a complicated block-based storage system... Continue Reading
-
February 05, 2007
05Feb2007
News
What about the system features, like snapshot and remote replication?
At this point in time, most customers expect to have these features in both block- and file-based storage products... Continue Reading
-
February 05, 2007
05Feb2007
News
What will be the impact on performance when mixing block and file in the same system?
Caching difficulties are one concern since caching patterns may not be optimized for block-based storage... Continue Reading
-
February 05, 2007
05Feb2007
News
Do all the vendors offer unified storage?
No. Some vendors are moving in that direction and others have a limited number of OEM product offerings now. However, several vendors currently offer established products... Continue Reading
-
February 05, 2007
05Feb2007
News
Acopia hypes heterogeneous snapshot
The file virtualisation startup is blustering about a demonstration of heterogeneous snapshot technology, but is being coy about releasing a product. Continue Reading
-
February 05, 2007
05Feb2007
News
Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ... Continue Reading
-
February 05, 2007
05Feb2007
News
Rootkit dangers at an 'all-time high'
Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users. Continue Reading
-
February 05, 2007
05Feb2007
News
Coviello: In 3 years, no more stand-alone security
RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure. Continue Reading
-
February 05, 2007
05Feb2007
News
Gates to outline Microsoft's new strategy for secure computing
Bill Gates is back at RSA. At this year's conference, Gates plans to speak about the evolution of authentication, network policies and data protection, signaling a change in his vision of a "Digital Decade." Continue Reading
-
February 05, 2007
05Feb2007
News
VoIP security, unified communications need questioned
VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies, according to CompTIA's recent survey. Continue Reading
-
February 05, 2007
05Feb2007
News
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof. Continue Reading
-
February 05, 2007
05Feb2007
News
Are there any differences in operations between unified storage and my existing storage systems?
Normally, a block storage system is handled by a storage professional or storage administrator... Continue Reading
-
February 05, 2007
05Feb2007
News
Does it cost extra for unified storage?
For a lot of NAS-based systems -- even Windows Storage Server (WSS) with an iSCSI target unified storage capability is probably... Continue Reading
-
February 05, 2007
05Feb2007
News
RSA Conference 2007: Product announcements
RSA Conference 2007: Product announcements Continue Reading
-
February 04, 2007
04Feb2007
News
RSA Conference 2007: Special news coverage
Check out news, interviews, product announcements, podcasts and more live from the RSA Conference 2007 in San Francisco. Continue Reading
-
February 04, 2007
04Feb2007
News
Vista exploitable, researcher says
Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista. Continue Reading
-
February 04, 2007
04Feb2007
News
CISOs mastering 'softer' skills
Why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader. Continue Reading
-
February 04, 2007
04Feb2007
News
Email security buying decisions
Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available. Continue Reading
-
February 04, 2007
04Feb2007
News
Dozens of Web sites spread malicious Trojan
Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites. Continue Reading
-
February 04, 2007
04Feb2007
News
New zero-day attack targets Microsoft Excel
Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk. Continue Reading
-
February 04, 2007
04Feb2007
News
HDS to acquire Archivas for up to $120M
HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market. Continue Reading
-
February 04, 2007
04Feb2007
News
HP fills in gaps with product updates
HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation. Continue Reading
-
February 04, 2007
04Feb2007
News
Intrusion detection systems are alive and kicking
IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products. Continue Reading
-
February 04, 2007
04Feb2007
News
Open source - What voice managers need to know
Open source technology can make sense for VoIP deployments, and can be used in a hybrid approach with existing proprietary hardware or software. Learn more in this tip. Continue Reading
-
January 31, 2007
31Jan2007
In Depth
New security vendors take on sophisticated attackers
IT Security vendors are developing technologies that show promise in preventing unknown attacks and protecting machines with zero-day vulnerabilities. Continue Reading
-
January 31, 2007
31Jan2007
News
Open source ID projects link up with Microsoft
Higgins-Bandit groups develop a new open source tool that could make independent ID systems compatible with Microsoft Windows CardSpace program. Continue Reading
-
January 31, 2007
31Jan2007
News
What is an E&M line? What is the difference between a 2 wire and 4 wire E&M?
What is an E&M line? What is the difference between a 2 wire and 4 wire E&M? Continue Reading
-
January 31, 2007
31Jan2007
News
Unified communications to fuel PBX growth
Unified communications will help push the PBX market to $7.5 billion over the next four years, according to recent research by the Dell'Oro Group. Continue Reading
-
January 30, 2007
30Jan2007
In Depth
Quiz: Using IAM tools to improve compliance
A five-question multiple-choice quiz to test your understanding of the content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Identity and Access Management Security School. Continue Reading
-
January 30, 2007
30Jan2007
News
Symantec exploitation video hits YouTube
Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on a vulnerable machine. Continue Reading
-
January 30, 2007
30Jan2007
News
Windows Vista voice command tricked
An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code. Continue Reading
-
January 30, 2007
30Jan2007
News
Microsoft disputes Word zero-day report
Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new. Continue Reading
-
January 30, 2007
30Jan2007
News
Lawyers discuss e-discovery gotchas
During panel sessions at Legal Tech, lawyers provided their insights into the e-discovery process, retention policies and helping judges get up to speed. Continue Reading
-
January 30, 2007
30Jan2007
News
Symantec unveils 'universal ID system'
Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers. Continue Reading
-
January 30, 2007
30Jan2007
News
Using IAM tools to improve compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes. Continue Reading
-
January 29, 2007
29Jan2007
News
Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs. Continue Reading
-
January 29, 2007
29Jan2007
News
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need. Continue Reading
-
January 29, 2007
29Jan2007
News
Entrust to sell cheaper hardware tokens
Security vendor Entrust Inc. will enter the hardware token market selling a $5 one-time password device. Experts say the move could reduce prices across the industry. Continue Reading
-
January 29, 2007
29Jan2007
News
VoIP call features give users more bang for their buck
2006 saw an increase in the popularity of VoIP and encouraged many competing service providers to offer features such as voicemail and Caller ID as standard in their best-selling service plans. Continue Reading
-
January 29, 2007
29Jan2007
News
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month. Continue Reading
-
January 29, 2007
29Jan2007
News
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need. Continue Reading
-
January 28, 2007
28Jan2007
News
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product. Continue Reading
-
January 28, 2007
28Jan2007
News
IBM to acquire Softek, looks to pump up services biz
IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business. Continue Reading
-
January 28, 2007
28Jan2007
In Depth
VoIP case studies: What you need to know
Case studies are the next best thing to being there. Learn how others overcame the expected and the unexpected challenges of a VoIP migration in our case studies series. Continue Reading
-
January 28, 2007
28Jan2007
News
Brocade unveils McData integration roadmap
McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager. Continue Reading
-
January 27, 2007
27Jan2007
News
Network visualization, automation: At odds?
Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of autonomic network performance. Why so? Loki ... Continue Reading
-
January 25, 2007
25Jan2007
News
Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
January 25, 2007
25Jan2007
News
Attacks targeted to specific applications
The fourth tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
January 25, 2007
25Jan2007
News
How to assess and mitigate information security threats
Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage. Continue Reading
-
January 25, 2007
25Jan2007
News
Malware: The ever-evolving threat
The first tip in our series, "How to assess and mitigate information security threats" Continue Reading
-
January 25, 2007
25Jan2007
News
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
January 25, 2007
25Jan2007
News
Threats to physical security
Tip No. 6 in our series, "How to assess and mitigate information security threats." Continue Reading
-
January 25, 2007
25Jan2007
News
Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
January 25, 2007
25Jan2007
News
IBM tool makes online purchases anonymous
A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option. Continue Reading
-
January 25, 2007
25Jan2007
In Depth
Storm Trojan was worse than it should have been
The "Storm" attack made a big splash because people keep falling for social engineering and there was simply little else in the news, experts say. Continue Reading
-
January 25, 2007
25Jan2007
News
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter. Continue Reading
-
January 25, 2007
25Jan2007
News
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system. Continue Reading
-
January 24, 2007
24Jan2007
News
iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs. Continue Reading
-
January 24, 2007
24Jan2007
In Depth
Quiz: Defending mobile devices from viruses, spyware and malware
A five-question multiple-choice quiz to test your understanding of the content presented in Defending mobile devices from viruses and malware lesson of SearchSecurity.com's Messaging Security School. Continue Reading
-
January 24, 2007
24Jan2007
News
Microsoft investigates new Word zero-day
An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday. Continue Reading
-
January 24, 2007
24Jan2007
In Depth
Fujitsu exec says SAS may take years to hit your array
Fujitsu's product development VP talks about the development of SAS, why Fujitsu won't be competing with Hitachi's 1 TB drive and the Star-Trek-like future of disks. Continue Reading
-
January 24, 2007
24Jan2007
News
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts. Continue Reading
-
January 24, 2007
24Jan2007
In Depth
VoIP security monitoring gets proactive
VoIP security and traffic monitoring have become imperatives, but it can still be tricky on a converged VoIP and data network. Continue Reading
-
January 24, 2007
24Jan2007
News
Microsoft, Nortel introduce new unified communications apps
Microsoft and Nortel's Innovative Communications Alliance takes unified communications to the next level with its latest combined applications. Continue Reading
-
January 24, 2007
24Jan2007
News
RSVP ready to manage VoIP, video traffic
Though its 10 year past was riddled with failures, RSVP is fast returning as one of the best tools for managing QoS for VoIP and video. Continue Reading
-
January 23, 2007
23Jan2007
News
Cisco fixes IOS flaws
Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes. Continue Reading
-
January 23, 2007
23Jan2007
News
Veracode launches on-demand code analysis service
New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code. Continue Reading
-
January 23, 2007
23Jan2007
News
McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee. Continue Reading
-
January 22, 2007
22Jan2007
News
MP slams slow payment of tax credit IT compensation
The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of payment, take US company EDS more than 100 years to pay off in full. Continue Reading
-
January 22, 2007
22Jan2007
News
EMC and Ibrix elbow out Panasas at Disney Studios
Disney needed a storage overhaul fast after merging with Pixar and making major changes to its upcoming new movie. Continue Reading
-
January 18, 2007
18Jan2007
News
ID theft victim to TJX customers: Mind your data
Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary. Continue Reading
-
January 18, 2007
18Jan2007
In Depth
Vendors: Cut the hype, truth is what sells
Storage virtualisation technologies have been purchased and implemented successfully for years. The rest of the IT infrastructure must try to catch up and, ultimately, the only thing not virtualised within the datacentre will be the last guy ... Continue Reading
-
January 18, 2007
18Jan2007
News
Can Caller ID on VoIP calls be customized?
Can I create the CID, name, area code and phone number that will display when I place a call via VoIP? Who do you like for VoIP service? Continue Reading
-
January 18, 2007
18Jan2007
News
What considerations do I need to make when setting up a VoIP system to our remote office?
What considerations do I need to make when setting up a VoIP system to our remote office? Continue Reading