News

Data centre hardware

  • November 12, 2006 12 Nov'06

    Wireless device flaw discovered

    A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs.

  • November 07, 2006 07 Nov'06

    VMware backup still tough

    VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 6

    What storage managers are buying and why

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 2

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 12, 2006 12 Sep'06

    Big security fixes for QuickTime, Flash Player

    Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • September 05, 2006 05 Sep'06

    Proofpoint delivers strong messaging security

    Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.

  • August 24, 2006 24 Aug'06

    What do tiered storage and ILM have to do with disaster recovery?

    That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our ...

  • August 17, 2006 17 Aug'06

    Apple fixes Xsan security flaw

    Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.

  • August 01, 2006 01 Aug'06

    Security Bytes: Exploits targeting freshly patched Apple flaw

    Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.

  • July 30, 2006 30 Jul'06

    EqualLogic updates storage provisioning software

    Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks.

  • July 16, 2006 16 Jul'06

    Automated provisioning quiz

    Take this five-question quiz to see how much you've learned about automated provisioning.

  • July 13, 2006 13 Jul'06

    Security Bytes: Investigators slam VA over data breach

    Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports.

  • May 23, 2006 23 May'06

    Sleep out to help homeless children

    The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords.

  • April 21, 2006 21 Apr'06

    Battery fault prompts HP laptops recall

    Hewlett-Packard is to recall more than 15,000 laptops worldwide because a fault makes them a fire hazard.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • October 03, 2005 03 Oct'05

    How to break into a computer that is right at your fingertips

    Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer.

  • September 29, 2005 29 Sep'05

    Find out how to bridge the communications gap

    Communications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500).

  • September 19, 2005 19 Sep'05

    Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day.

  • September 11, 2005 11 Sep'05

    VoIP turns up the heat on firewalls

    New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • August 06, 2005 06 Aug'05

    Trusted Computing Group releases server specs

    The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches.

  • July 12, 2005 12 Jul'05

    Tony Asaro: Blogs and more

    Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.

  • May 09, 2005 09 May'05

    Computer Weekly wins top honour

    ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for...

  • March 21, 2005 21 Mar'05

    Linux lags Windows in new security report

    A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well.

  • February 25, 2005 25 Feb'05

    Intel offers 64-bit desktop processors

    Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid...

  • February 14, 2005 14 Feb'05

    Strategic Storage: DR planning blueprint

    Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan ...

  • February 08, 2005 08 Feb'05

    Loop switch

    Loop switch

  • February 07, 2005 07 Feb'05

    SATA drives product roundup

    <------No summary found------->

  • January 17, 2005 17 Jan'05

    Computer Weekly barred from briefing on national programme

    The first media demonstration of new multibillion-pound NHS IT systems took place in Whitehall last week - but technology...

  • October 26, 2004 26 Oct'04

    Clear double advantage

    ClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and...

  • February 09, 2004 09 Feb'04

    More questions and answers from SAN School lesson # 5

    Here are additional questions and answers from SAN School Lesson 5: Designing a SAN. The questions cover topics ranging from how to determine an effective SAN design to meet your needs, to the differences between fabric switches and loop switches.

  • January 15, 2004 15 Jan'04

    Resource guide to disk-based backup

  • November 14, 2002 14 Nov'02

    Chinook parents set to appeal to Europe

    The parents of the two Chinook helicopter pilots labelled guilty of gross negligence over the Mull of Kintyre disaster are...

  • October 31, 2002 31 Oct'02

    Government blocks judicial review of Chinook disaster

    The Government has made it impossible for the families of two pilots blamed for the crash of Chinook helicopter ZD576 to seek a...

  • July 24, 2002 24 Jul'02

    MoD refuses to concede error in Chinook verdict

    The Ministry of Defence (MoD), citing a new series of simulations by Boeing, has refused to clear the names of two pilots blamed...

  • March 28, 2002 28 Mar'02

    Minister slams Chinook campaign in debate

    In the week when he sent 1,700 troops to Afghanistan, defence secretary Geoff Hoon issued a blistering criticism of Computer...

  • February 14, 2002 14 Feb'02

    Lords Chinook challenge

    The Government expects to have a debate in the House of Lords on last week's select committee report on the fatal crash of...