Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2008 Stories
-
July 31, 2008
31Jul2008
In Depth
NAS virtualization explained
NAS virtualization can refer to the ability to virtualise multiple NAS heads into a single virtualised file system or the ability to spawn multiple virtual file servers within a physical file server. Either way, performing NAS virtualisation via a ... Continue Reading
-
July 31, 2008
31Jul2008
News
Minister hails Fujitsu’s leaving NPfIT as sign of strength
The termination of Fujitsu's... Continue Reading
-
July 30, 2008
30Jul2008
News
NetApp dedupes data on rivals' primary storage
NetApp extends its free data deduplication to its V-Series gateways, making it possible for its customers to dedupe their primary storage. But users say what's missing is a GUI and data dedupe for VTLs. Continue Reading
-
July 28, 2008
28Jul2008
News
3PAR shrinks virtual desktop storage
3PAR's software package allows users of its high-end disk arrays to store a single "golden image" of virtual desktops and hold that image in cache for better boot performance. Continue Reading
-
July 20, 2008
20Jul2008
News
Unified communications trigger data leakage dangers, survey finds
Companies are concerned about unintentional data leaks, according to a survey conducted by Osterman Research. Continue Reading
-
July 17, 2008
17Jul2008
News
How to move from Microsoft Virtual Server to Hyper-V
If you plan the upgrade from Virtual Server to Hyper-V, here's how to get onto Microsoft's new virtualisation platform. Continue Reading
-
July 16, 2008
16Jul2008
In Depth
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
July 15, 2008
15Jul2008
Tip
Network management frameworks: FCAPS and ITIL
Two network management frameworks exist that can be of some use for understanding and taming network management: FCAPS and ITIL. Learn more about what these FCAPS and ITIL are and how they can simplify network management in this crash course. Continue Reading
-
July 15, 2008
15Jul2008
News
Linksys WAP2000 Business Access Point: Review and configuration
Our labs run their eyes over Linksys' new WAP 2000, a VoIP and WLAN router for small businesses. Continue Reading
-
July 03, 2008
03Jul2008
News
intel part 2
This is a replacement for the existing Intel story by JP with the same intro.
Intel unveils predictions for next gen of processors - by John-Paul Kamath
The...
Continue Reading -
July 02, 2008
02Jul2008
News
Unix admin tutorial: How much memory is in this machine?
It's not always straightforward to get the answer to the burning question: How much memory is in this Unix machine? David Douthitt points readers to the answers for Solaris, AIX, HPUX, Linux, OpenVMS, and FreeBSD environments. Continue Reading
-
July 02, 2008
02Jul2008
News
Friction grows between storage vendors, VMware
As the booming server virtualisation market spawns new competitors to VMware, how virtual machines connect with storage is becoming a matter of contention among vendors. Continue Reading
-
July 01, 2008
01Jul2008
News
Virtual machines present dynamic environment issues for network pros
Virtualisation can mean network managers need to develop an infrastructure for redirecting IP addresses across a WAN. Continue Reading
-
June 30, 2008
30Jun2008
News
Sizing server hardware for virtual machines
How many virtual machines can you put on a server? Depends upon whether your hardware and virtualisation environment are well-matched. This tip offers four criteria for selecting the right servers for VMs. Continue Reading
-
June 27, 2008
27Jun2008
News
Unified Communications opportunity can be lost by bad management
Unified Communications can go awry when users are too connected, too often.Some companies, Intel included, are therefore switching off access to their staff at some times! Continue Reading
-
June 26, 2008
26Jun2008
News
Cisco warns of UCM flaws
Cisco has warned that several versions of its Unified Call Managers have security problems. Continue Reading
-
June 25, 2008
25Jun2008
News
Telepresence reaches down to smaller businesses
Telepresence suites are emerging for smaller businesses, as vendors saturate the big end of town. Continue Reading
-
June 24, 2008
24Jun2008
News
Palm Treo 850 info, photos are leaked
The Palm Treo 850, making an unexpected appearance, was recently leaked. Continue Reading
-
June 24, 2008
24Jun2008
Tip
iSCSI SANs getting enterprise boost by shared storage, virtual servers
Enterprises are increasingly considering iSCSI SANs for departmental applications, server workloads that aren't bandwidth-intensive, and virtual servers. In fact, the connection between shared storage and virtualised servers is changing the iSCSI ... Continue Reading
-
June 18, 2008
18Jun2008
News
Unified communications' business value cloudy, but enterprises want it
Unified communications (UC)'s business value remains unclear, but line-of-business executives are all for the technology. Continue Reading
-
June 17, 2008
17Jun2008
News
Integrating presence into the enterprise
Confused by presence and its benefits? Here's how to get the technology working for you. Continue Reading
-
June 17, 2008
17Jun2008
News
Fujitsu quit NHS project as terms were unaffordable, MPs told
Fujitsu Services withdrew from talks to re-negotiate... Continue Reading
-
June 16, 2008
16Jun2008
News
Introduction to firewalls
What is a network firewall? What types of firewalls are there, and which kind best protects your company's data? All of these questions, and more, are answered in our network security firewall guide. Continue Reading
-
June 16, 2008
16Jun2008
News
Gary McKinnon broke into 73,000 US government computers, Lords told
Self confessed British hacker Gary McKinnon, who is fighting extradition to the US, broke into more than 73,000 US government computers, including those of the US Army, Navy and Nasa, and deleted critical data, the House of Lords heard today. Continue Reading
-
June 13, 2008
13Jun2008
News
How can I configure 10 VLANs with 5 unmanaged switches?
Given a Cisco Layer 3 (L3) switch and 5 unmanaged switches, learn how to create 10 VLANs from our routing and switching expert, Sudhanshu Gupta. Continue Reading
-
June 12, 2008
12Jun2008
Tip
What are the best methods for handling rogue access points?
Michael Gregg explains how to enforce network policy and handle rogue access points (APs) in this expert response. Continue Reading
-
June 10, 2008
10Jun2008
Tip
What is a logical network? How do you improve one?
Learn what logical and physical networks are and how to improve them, in this expert response with networking fundamentals expert, Chris Partsenidis. Continue Reading
-
June 06, 2008
06Jun2008
News
Microsoft OCS powerful but needs third parties for complete solution
Microsoft's OCS can run enterprise voice, but users are waiting for links to existing products before taking the plunge, analysts say. Continue Reading
-
June 05, 2008
05Jun2008
News
Gartner's Top 10 disruptive technologies for 2008 to 2012
What are the new technologies that will change the way IT departments operate? Adam Turner reveals Gartner's top ten future disruptors. Continue Reading
-
June 05, 2008
05Jun2008
Tip
Windows registry forensics guide: Investigating hacker activities
Ed Skoudis explains how investigators and administrators can interact with the Windows registry to analyse a compromised system. Continue Reading
-
June 03, 2008
03Jun2008
News
Understanding remote scripting: Managing Windows networks using scripts, Part 9
Our series on managing Windows networks using scripts continues. Continue Reading
-
June 02, 2008
02Jun2008
Blog Post
Chinook ZD576 - a rare, perhaps unique, photo
This photo of Chinook ZD576 is the copyright of Robin Crorie who has given kind permission for it to be used by Computer Weekly in connection with the Campaign for Justice to clear the names of the ... Continue Reading
-
June 02, 2008
02Jun2008
News
Chinook ZD576: exclusive picture
This photo of Chinook ZD576 is the copyright of Robin Crorie who has given kind permission for it to be used by Computer Weekly in connection with our Campaign... Continue Reading
-
June 01, 2008
01Jun2008
News
Troubleshooting IP Routing -- 'CCNA Official Exam Certification Library, 3rd Edition,' Chapter 7
This eBook chapter examines troubleshooting the IP routing process. Read more to learn if your IP routing troubleshooting is up to scratch! Continue Reading
-
June 01, 2008
01Jun2008
News
Wireless LANs -- 'CCNA Official Exam Certification Library, Third Edition,' Chapter 11
This chapter examines the basics of WLANs to help you prepare for the CCNA exam. In particular, the first section introduces the concepts, protocols, and standards used by many of the most common WLAN installations today. The chapter then examines ... Continue Reading
-
May 29, 2008
29May2008
News
Cisco smartens up the wireless network with Motion platform
Cisco will soon release a new product that integrates wireless devices and wired networks to enable seamless handovers and uninterrupted data access. Continue Reading
-
May 28, 2008
28May2008
In Depth
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
May 27, 2008
27May2008
News
New doubts raised on Chinook crash ruling
A former senior officer who helped write rules for RAF accident inquiries has spoken publicly for the first time about his concerns over the cause of a controversial Chinook helicopter crash 14 years ago. Continue Reading
-
May 20, 2008
20May2008
News
What is 802.11n "Greenfield" mode?
802.11n has a special facility called "Greenfield" mode to help it increase speed. Continue Reading
-
May 19, 2008
19May2008
News
NSW Ambulance Service rebuilds its comms systems
The Ambulance Service of New South Wales has completed a massive revamp of its networks and customer contact systems. Continue Reading
-
May 19, 2008
19May2008
News
Norwich Union signs £300m deal with Cable & Wireless
Aviva Insurance Group, which owns Norwich Union, has signed a six-year IT outsourcing contract worth £300m with Cable & Wireless.
The company will...
Continue Reading -
May 15, 2008
15May2008
News
What is data loss prevention? -- An introduction to DLP
This Q&A discusses what data loss prevention (DLP) is and how it differs from other networking security products in securing your enterprise and keeping your business reputable. Continue Reading
-
May 12, 2008
12May2008
???archiveContentType.none_content???
Content Management System (CMS) Sourcing Guide
A CMS enables a website to control and create their content effectively and efficiently. To help you make the right decision, download our free guide to CMS software. If already know what your CMS software requirements are, get free no obligation ... Continue Reading
-
May 11, 2008
11May2008
News
Is echo inherent to VoIP?
VoIP lines are sometimes criticised for delivering more echo than their analog cousins. We explain how to fix the problem in this tip. Continue Reading
-
April 28, 2008
28Apr2008
Answer
What are the dangers of using Facebook, other social networking sites?
Ken Munro discusses the dangers associated with allowing employees to access social networking sites such as Facebook, and explains how corporations can avoid these risks by monitoring the information placed in employee profiles and using email ... Continue Reading
-
April 23, 2008
23Apr2008
Blog Post
Some of the good and bad at HC2008 - a summing up
Comment: My highly subjective overview of some of the good and bad at HC2008, the annual Healthcare Computing conference in Harrogate.. The bad: Some of the speeches were, as in previous years, ... Continue Reading
-
April 18, 2008
18Apr2008
Blog Post
Career management: How to get headhunted
Following my interview with Microsoft COO Kevin Turner about how IT staff can reach the top and earn more, we've had a couple of e-mails on how to get headhunted. If there is a single watchword for ... Continue Reading
-
April 18, 2008
18Apr2008
News
Optimising iSCSI SANs with the right Ethernet switch
iSCI SANS are now within the reach of many small businesses. Here's how to make sure the SAN works best, by optimising the supporting network. Continue Reading
-
April 15, 2008
15Apr2008
News
EDITORIAL: It's time for a Net Neutrality debate
Australia should sort out its position on Net Neutrality before the National Broadband Network is built, not afterwards, writes TechTarget ANZ Editor Simon Sharwood. Continue Reading
-
April 15, 2008
15Apr2008
News
EDITORIAL: It's time for a Net Neutrality debate
Australia should sort out its position on Net Neutrality before the National Broadband Network is built, not afterwards, writes TechTarget ANZ Editor Simon Sharwood. Continue Reading
-
April 09, 2008
09Apr2008
News
Transitioning to unified communications with e-learning
Unified communications is not something every worker can adopt straight away. E-learning tools can ease their path to adoption. Continue Reading
-
April 09, 2008
09Apr2008
News
Transitioning to unified communications with e-learning
Unified communications is not something every worker can adopt straight away. E-learning tools can ease their path to adoption. Continue Reading
-
April 08, 2008
08Apr2008
News
SNW Roundup: Sun adds data deduplication to VTL
Sun comes out with VTL Prime, a virtual tape library with FalconStor's data deduplication; Attune gets into file archiving; and SGI, Fujitsu and Dot Hill launch storage systems. Continue Reading
-
April 07, 2008
07Apr2008
News
Isilon reveals turnaround plan
Clustered storage vendor vows to continue to spend on product development, sales and marketing, despite losing nearly $27 million (£13.5m) in its first year as public company. Continue Reading
-
April 06, 2008
06Apr2008
News
Governance, compliance, security: How are these network problems?
Governance is often perceived as a C-level issue. Yet network professionals must recognise that they have responsibility for these issues too! Continue Reading
-
April 04, 2008
04Apr2008
Tip
Recovering domain controllers after a server disk failure
When recovering domain controllers after a system volume failure, normal restoration doesn't always work. Learn some special procedures in this tip. Continue Reading
-
April 04, 2008
04Apr2008
News
Does rapid UC innovation beget slow implementation rates?
As unified communications (UC) technology grows, many enterprises are left to play catch-up. Continue Reading
-
April 04, 2008
04Apr2008
News
How to scope the liability clause in your software license agreement
Standard limit of liability clauses favour the vendor. Here's how to modify them to protect your firm from IT risk. Continue Reading
-
March 27, 2008
27Mar2008
News
How to subnet: Subnetting calculations and shortcuts
Learn how subnetting works in this tip and quiz on how to calculate a subnet mask. IP address classes and bit values of octets are explained in detail. Continue Reading
-
March 27, 2008
27Mar2008
News
DNS monitoring: If it's slow, everything is slow
Techniques for monitoring DNS performance, and the impact on applications when it is not performing properly, are explored in this tip. Continue Reading
-
March 27, 2008
27Mar2008
News
Getting the best bargain on network vulnerability scanning
When it comes to enterprise network analysis, is it best to use a commercial vulnerability scanner or an open source product? Mike Chapple explains. Continue Reading
-
March 26, 2008
26Mar2008
News
Application delivery controllers: Moving toward the application-centric network
Application delivery controllers (ADCs) have evolved from server load balancers (SLBs) to deal with growth of networked application delivery. Continue Reading
-
March 24, 2008
24Mar2008
News
Open platforms are essential to the future of unified communications
At VoiceCon 2008, keynote speakers stressed the importance of openness and interoperability of unified communications platforms. Continue Reading
-
March 19, 2008
19Mar2008
News
Cisco Certified Voice Professional lab updates mimic live networks
The new Cisco CCVP certification updates training courses to fall in line with the latest Unified Communications Manager platform. Continue Reading
-
March 19, 2008
19Mar2008
News
Cisco Certified Voice Professional lab updates mimic live networks
The new Cisco CCVP certification updates training courses to fall in line with the latest Unified Communications Manager platform. Continue Reading
-
March 18, 2008
18Mar2008
News
Avaya solves fragmented presence problem with federated presence server
Avaya launches Intelligent Presence Server, which solves the problem of fragmented presence within an enterprise. Continue Reading
-
March 17, 2008
17Mar2008
Tip
Upgrade your network: Network evolution and roadmap
Network upgrades are essential to provide availability, reliability and security when you run voice and video on your data network. Continue Reading
-
March 14, 2008
14Mar2008
News
EMC gives Centera a software refresh
EMC has tweaked the software for its Centera archiving system with an emphasis on handling more pieces of data rather than sheer bulk of information stored. Continue Reading
-
March 13, 2008
13Mar2008
News
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. Continue Reading
-
March 13, 2008
13Mar2008
News
NetApp says flagging economy could boost its sales
The current economic downturn may actually help boost NetApp's appeal to storage users, according to company officials at its US Analyst Day Continue Reading
-
March 12, 2008
12Mar2008
News
Green networking: Energy efficient upgrades can cut costs
Using green networking products, like more efficient gigabit Ethernet switches, to replace aging networking equipment can cut runaway energy costs. Continue Reading
-
March 10, 2008
10Mar2008
News
Social connectivity as part of your unified communications strategy
Unified communications provides remote employees the ability to work from a home office, and use social networking sites and IM to collaborate with co-workers. Continue Reading
-
March 10, 2008
10Mar2008
News
Web 2.0 presents no new security challenges, is just marketing hype: Secure Computing
Secure Computing's Scott Montgomery says Web 2.0 security is marketing hype, application flaws come from overworked programmers and Australia is doing better at cyber-security than the USA and Europe. Continue Reading
-
March 10, 2008
10Mar2008
Tip
Five command line tools to detect Windows hacks
Learn about five of the most useful Windows command-line tools for machine analysis and how they can tell if a machine has been hacked in this tip. Continue Reading
-
March 09, 2008
09Mar2008
News
Hot Spots: A new level of backup reporting
A bumper crop of backup reporting tools can provide invaluable insight into backup operations for you and the boss. Continue Reading
-
March 06, 2008
06Mar2008
News
Siemens OpenScape offers tight integration of voice, video and messaging
Siemens OpenScape Unified Communications Server offers voice, video and messaging integration. Continue Reading
-
March 06, 2008
06Mar2008
News
Losing the war to lock down networks might help enterprises innovate
While security concerns cannot be set aside, users unwilling to leave their own applications at home might bring some innovation to the office. Continue Reading
-
March 05, 2008
05Mar2008
News
Virtual servers' impact on the network
When several servers combine as one, what does it do to the network? Continue Reading
-
March 05, 2008
05Mar2008
News
Google offers beta of free unified messaging service
Google has opened up GrandCentral, a free unified messaging and phone management service, to a limited beta. Continue Reading
-
March 03, 2008
03Mar2008
News
Security considerations for unified communications
A successful UC deployment requires a solid understanding of potential security risks and how to avoid various attacks. Continue Reading
-
March 02, 2008
02Mar2008
News
Evaluating messaging and email platforms
Messaging and email systems are incorporating more capabilities than ever. Learn what to think about when upgrading your messaging platform. Continue Reading
-
February 28, 2008
28Feb2008
Blog Post
Police to be allowed searches of national database of NHS patient records
News analysis It went largely unnoticed but the minister for the NHS’s National Programme for IT, Ben Bradshaw, has confirmed that data on a central database of millions of confidential health ... Continue Reading
-
February 27, 2008
27Feb2008
News
Alcatel-Lucent Forum: The Dynamic Enterprise
The Alcatel-Lucent Forum recently held in Paris was centred on building the Dynamic Enterprise. Continue Reading
-
February 26, 2008
26Feb2008
Tip
VoIP bandwidth: Calculate consumption
The bandwidth needed for VoIP depends on compression technology, packet overhead and the protocol used. Learn how to figure out what bandwidth you'll need. Continue Reading
-
February 26, 2008
26Feb2008
News
Cisco hooks up WAAS with Windows Server 2008
Cisco and Microsoft divulge a deal to sell Windows Server 2008 installed on Cisco Wide Area Applications Services (WAAS) appliances for remote offices. Continue Reading
-
February 25, 2008
25Feb2008
News
CCNA certification for Cisco networking channel professionals
CCNA certification offers value-added resellers (VARs) and systems integrators benefits, as described here by Wendell Odom. Continue Reading
-
February 25, 2008
25Feb2008
News
Springer Handbook of Speech Processing
The Springer Handbook of Speech Processing provides the reader vital information needed to implement and understand VoIP. Continue Reading
-
February 24, 2008
24Feb2008
News
Six steps to create a wireless LAN
Wireless LANs are deceptively simple to create. Follow our guide to ensure your WLAN has perfect coverage, can handle your applications and is easy to manage. Continue Reading
-
February 19, 2008
19Feb2008
News
Top ten UC terms
Here you'll find our ten favourite unified communication terms, including communication-enabled business processes, SIP, IM, presence, and more. Continue Reading
-
February 18, 2008
18Feb2008
News
Data Domain makes remote office data deduplication push
Data Domain launches its smallest data deduplication appliance specifically built to reduce and back up data at remote offices. Continue Reading
-
February 17, 2008
17Feb2008
News
Introduction to wireless networks - from "The book of wireless"
Learn about the standards and specifications that control wireless networks and explains how data moves through the network from one computer to another. Continue Reading
-
February 17, 2008
17Feb2008
News
NAS product specifications
NAS is so easy to install and manage that NAS sprawl is a common problem. This is why NAS is often a prime candidate for consolidation initiatives. Learn how to purchase NAS appliances with an eye toward NAS storage consolidation. Continue Reading
-
February 17, 2008
17Feb2008
News
VMware, LeftHand offer iSCSI SAN as virtual machine
Channel partners will bundle LeftHand's virtual SAN appliance with VMware licenses for an ESX infrastructure that can run on one piece of physical hardware. Continue Reading
-
February 15, 2008
15Feb2008
Blog Post
ID Cards and the NPfIT – nobody is “responsible”
Cabinet ministers come and go, as do prime ministers, and heads of departments. So who will actually be responsible for ID cards or the NHS's National Programme for IT? Nobody. Thank you to Brian ... Continue Reading
-
February 13, 2008
13Feb2008
News
HP exec: Storage blades may replace disk arrays in data center
An HP storage executive predicts that storage blades -- storage devices using the form factor and plug-and-play philosophy of blade servers - may replace disk arrays in the next 18 months Continue Reading
-
February 11, 2008
11Feb2008
News
Build a solid Web conferencing strategy
Web conferencing application implementation is expected to grow along with the introduction of video and sharing elements. Continue Reading
-
February 11, 2008
11Feb2008
News
penetration testing tutorial day one the basics
TechTarget ANZ expert Ed Eliff explains botnets and offers advice on how to make sure your machines do not get get caught up in one. Continue Reading
-
February 07, 2008
07Feb2008
News
Intelligent network switches on the rise as more is expected of the network
With businesses expecting their networks to provide more services, vendors are building more intelligence into their switches. Continue Reading
-
February 06, 2008
06Feb2008
News
IM security threats and resources
Instant messaging applications have their own set of security guidelines to prevent hacking. Continue Reading
-
February 04, 2008
04Feb2008
News
The benefits and challenges of presence within unified communications
Unified communications may be the next big thing in networking, but presence is quickly becoming the next big thing within unified communications. Continue Reading