News

News Archive

  • August 19, 2007 19 Aug'07

    Push voice is the next mobility must-have

    Push voice, coupled with mobile email, has the potential to make the smartphone a true mobile office.

  • August 19, 2007 19 Aug'07

    Your networking certification game plan

    To pass your networking certification exams, use these suggested lab setups, activities and reading materials to CompTIA A+, MCSE, Network+, MCSA, CCNA and Linux+ certify.

  • August 17, 2007 17 Aug'07

    Wal-Mart deploys new data security system

    Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network.

  • August 17, 2007 17 Aug'07

    HDS, HP simplify high-end disk array pricing

    Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity.

  • August 17, 2007 17 Aug'07

    Compliance, data breaches heighten database security needs

    Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements.

  • August 16, 2007 16 Aug'07

    Voice over IPv6: Architectures for Next Generation VoIP Networks

    VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those ...

  • August 16, 2007 16 Aug'07

    TJX profit takes hit over data breach

    TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.

  • August 15, 2007 15 Aug'07

    VoIP models and services: Complete guide

    With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs.

  • August 15, 2007 15 Aug'07

    Latest Microsoft flaws affect Windows, IE, Excel

    Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS.

  • August 14, 2007 14 Aug'07

    QoS -- What voice managers need to know

    Quality of Service (QoS) technologies can be quite confusing between technical complexities and marketing jargon. In this tip, find out what voice managers need to know about QoS as it relates to VoIP.

  • August 14, 2007 14 Aug'07

    Novell to acquire Senforce for endpoint security

    Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite.

  • August 14, 2007 14 Aug'07

    Apple iPhone to provoke complex mobile attacks, expert warns

    Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.

  • August 14, 2007 14 Aug'07

    Telstra network build spurs new security plan

    Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy.

  • August 13, 2007 13 Aug'07

    Data backup copies overview

    How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity.

  • August 13, 2007 13 Aug'07

    EMC cashes in with VMware IPO

    EMC officially spins off part of its server virtualization subsidiary to the tune of $1.1B. Analysts are hoping the windfall will lead to deeper storage partnerships.

  • August 13, 2007 13 Aug'07

    Fibre-optic networks: Access network design

    Fibre-optic technology in access networks is expanding due to the demand for broadband. Learn about FTTX and passive optical networking (PON) systems.

  • August 13, 2007 13 Aug'07

    VoIP vulnerability threatens data

    VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.

  • August 13, 2007 13 Aug'07

    Gartner security summit outlines 'Security 3.0'

    Gartner has opened its Sydney Security Summit with a definition of Security 3.0.

  • August 12, 2007 12 Aug'07

    Implementing video on demand

    Video on demand (VoD), in at least some of its potential service models, is perhaps the most challenging of all network applications. Implementation of VoD should be should be undertaken in three particular steps.

  • August 12, 2007 12 Aug'07

    IPv6 from 'CCNA Portable Command Guide', Chapter 25

    IPv6, 'CCNA Portable Command Guide,' Chapter 25, explains IPv6 address assignment, static routes in IPv6, IPv6 ping, IPv6 tunnels and RIPng. Learn all you need to know to pass the IPv6 questions on your Cisco Certified Network Associate exam.

  • August 10, 2007 10 Aug'07

    SMEs’ CRM needs catered for in Sage 200

    Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200.

  • August 09, 2007 09 Aug'07

    Buying Guide for NAS management software

    Learn the key evaluation factors for purchasing NAS management software in this Buying Guide.

  • August 09, 2007 09 Aug'07

    NAS appliance purchase considerations

    NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...

  • August 09, 2007 09 Aug'07

    Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'

    Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...

  • August 09, 2007 09 Aug'07

    Sun adds virtual tape library to Thumper

    Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.

  • August 09, 2007 09 Aug'07

    Cisco warns of critical IOS flaws

    Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.

  • August 09, 2007 09 Aug'07

    IT pros impede PCI, Sarbanes Oxley compliance

    The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.

  • August 09, 2007 09 Aug'07

    VeriSign employee data exposed in laptop theft

    Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.

  • August 09, 2007 09 Aug'07

    VoIP vulnerability threatens data

    VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.

  • August 09, 2007 09 Aug'07

    Immunity releases new exploit-writing tool

    Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.

  • August 09, 2007 09 Aug'07

    Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'

    Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...

  • August 08, 2007 08 Aug'07

    NAS appliance specifications

    NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...

  • August 08, 2007 08 Aug'07

    NAS management software specifications

    Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...

  • August 08, 2007 08 Aug'07

    Cisco warns of critical IOS flaws

    Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.

  • August 08, 2007 08 Aug'07

    Wi-Fi simplicity edging out Wi-Fi security

    Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.

  • August 08, 2007 08 Aug'07

    EMC's RSA to acquire Tablus for data loss prevention

    RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software.

CIO
Security
Networking
Data Center
Data Management
Close