News
News Archive
-
September 20, 2007
20
Sep'07
Unified communications an 'uphill battle' for Microsoft
Unified communications is going to be a tough sell for Microsoft, which is looking to eliminate the PBX and go all software.
-
September 20, 2007
20
Sep'07
Wireless troubleshooting
Wireless network troubleshooting basics are discussed in this guide.
-
September 19, 2007
19
Sep'07
End-to-end network management enables reliable VoIP, unified communications
Monitoring voice quality, service availability, and security conditions are discussed in this Q & A with Gurmeet Lamba of Clarus Systems.
-
September 19, 2007
19
Sep'07
802.11 protocols
802.11 wireless protocols and deployment basics are discussed in this guide.
-
September 18, 2007
18
Sep'07
Cisco to acquire Cognio
Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility.
-
September 18, 2007
18
Sep'07
Nokia to acquire mobile advertiser
Nokia has announced it has entered into an agreement to acquire mobile advertising and marketing company Enpocket for an undisclosed amount.
-
September 18, 2007
18
Sep'07
Wireless security
Wireless security and polices are covered in this guide.
-
September 17, 2007
17
Sep'07
Wireless network deployment and management
Wireless network deployment and management are discussed in this guide.
-
September 17, 2007
17
Sep'07
Wireless access points
The basics of wireless access point (AP) as well as configuration and placement are covered in this guide.
-
September 16, 2007
16
Sep'07
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments.
-
September 16, 2007
16
Sep'07
Storage Decisions Session Downloads: Data Protection and Backup Track (NYC 2007)
Making the backup process seamless and reliable is critical. This track covers the staple backup technologies such as disk and tape, but also has an eye on the litany of new technologies set to drastically alter the data protection landscape. ...
-
September 16, 2007
16
Sep'07
Communications-as-a-service taking hold
Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system.
-
September 16, 2007
16
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out.
-
September 16, 2007
16
Sep'07
Wireless protocols learning guide
Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide.
-
September 16, 2007
16
Sep'07
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager Express.
-
September 10, 2007
10
Sep'07
Product Roundup: E-discovery
A look at some of the suppliers and products that make up the e-discovery market.
-
September 09, 2007
09
Sep'07
VoIP, unified communications prompt new technologies, threats
Wireless voice servers and handsets, VoIP and unified communications threats, and licensing agreements constitute recent changes in the VoIP market.
-
September 09, 2007
09
Sep'07
NetApp, HDS tout scaled-down disk arrays
New offerings are meant to take advantage of storage growth in the midmarket, but experts say the products will still probably appeal most to existing high-end users.
-
September 09, 2007
09
Sep'07
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage.
-
September 07, 2007
07
Sep'07
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix.
-
September 07, 2007
07
Sep'07
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned.
-
September 07, 2007
07
Sep'07
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan.
-
September 06, 2007
06
Sep'07
Learn all about SATA
This handbook offers three related SATA tips which compare SATA to SAS and SCSI and provides advice on striking the right balance between them.
-
September 06, 2007
06
Sep'07
IDC: High-end storage stalls in second quarter
IDC reports a lull in high-end enterprise spending in its quarterly disk tracker, with new growth lower in the market; Seagate plans encrypted 1 TB disk drive for PCs.
-
September 06, 2007
06
Sep'07
Citrix adds Web security with acquisition
Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing.
-
September 06, 2007
06
Sep'07
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months.
-
September 05, 2007
05
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.
-
September 05, 2007
05
Sep'07
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes.
-
September 05, 2007
05
Sep'07
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system.
-
September 04, 2007
04
Sep'07
IT cheat sheets for all
They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz.
-
September 04, 2007
04
Sep'07
NetApp files suit against Sun over ZFS
NetApp says Sun's ZFS violates its patents and seeks an injunction against its distribution, potentially putting Sun's storage business at risk. Update 9/6/07: Sun counterattacks.
-
September 04, 2007
04
Sep'07
Cisco goes next generation with 802.11n
Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access.
-
September 02, 2007
02
Sep'07
Wireless network security: Controlling secondary connections
Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured.
-
September 02, 2007
02
Sep'07
Now the dust has settled on pornography filtering...
Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans.
-
August 31, 2007
31
Aug'07
Cisco issues CallManager security update
Security flaws in Cisco CallManager and Unified Communications Manager could be exploited for cross-site scripting and SQL injection attacks, but a security update is available.
-
August 31, 2007
31
Aug'07
Suncorp reveals five-year VoIP plan
Financial services group Suncorp explains its plans to IP-enable its operations to Adam Turner.
-
August 30, 2007
30
Aug'07
Network access control vendors: Attraction vs. retention
Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis.
-
August 30, 2007
30
Aug'07
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia.
-
August 30, 2007
30
Aug'07
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system.
-
August 29, 2007
29
Aug'07
IMS, FMC on telecom carrier roadmaps
IMS and FMC are top of the to-do lists of service providers trying to differentiate themselves from the competition, according to an Infonetics Research study.
-
August 29, 2007
29
Aug'07
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology.
-
August 28, 2007
28
Aug'07
Unified communications slow to change U.S. work culture
Unified communications implementation is still high, but many enterprises have yet to allow users all its advantages.
-
August 28, 2007
28
Aug'07
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be ...
-
August 28, 2007
28
Aug'07
VoIP, unified communications study reveals challenges
VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by convergence.
-
August 28, 2007
28
Aug'07
VoIP, unified communications study reveals challenges
VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by convergence.
-
August 28, 2007
28
Aug'07
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems.
-
August 27, 2007
27
Aug'07
VoIP, unified communications study reveals challenges
VoIP and unified communications deployments can affect other applications. A recent study by Network General highlighted some of the challenges introduced by convergence.
-
August 27, 2007
27
Aug'07
VoiceCon Fall 2007: Unified communications still has barriers
Unified communications (UC) offers streamlined communication, but significant challenges still need to be addressed.
-
August 26, 2007
26
Aug'07
What is considered best practices in terms of backup vaulting (offsite storage) frequency?
As a consultant, this is something that I run into frequently. There seems to be a belief that if you're a smaller shop or smaller business: You don't have a lot of data, and you don't need to send your data offsite very often. A lot of times, the ...
-
August 26, 2007
26
Aug'07
IBM back in iSCSI SAN fray
IBM is looking to take on HP's MSA and EMC's AX150, as well as EqualLogic and LeftHand, with a new iSCSI SAN product OEMed from LSI.