News

News Archive

  • March 25, 2007 25 Mar'07

    Basic VoIP network setup

    Basic VoIP network setup advice.

  • March 25, 2007 25 Mar'07

    Why is VoIP authentication essential?

    VoIP authentication advice.

  • March 25, 2007 25 Mar'07

    VoIP protocols

    VoIP protocols -- the strengths and weaknesses of each.

  • March 22, 2007 22 Mar'07

    Flaws haunt protocol tied to national infrastructure

    Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.

  • March 22, 2007 22 Mar'07

    Mozilla releases Firefox fix

    One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11.

  • March 22, 2007 22 Mar'07

    Midrange storage array purchase considerations

    A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot product comparisons between v

  • March 22, 2007 22 Mar'07

    Midrange storage array specifications

    Product snapshots highlighting key specifications for a cross section of midrange storage array products.

  • March 22, 2007 22 Mar'07

    11n will boost speed, prompt upgrades

    802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes.

  • March 21, 2007 21 Mar'07

    Storage Security FAQ audiocast

    Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can download the entire presentation or the individual questions that you are most interested in.

  • March 21, 2007 21 Mar'07

    Hackers broaden reach of cross-site scripting attacks

    An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet.

  • March 21, 2007 21 Mar'07

    VoiceCon Spring: A transition show for the VoIP industry

    VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show.

  • March 20, 2007 20 Mar'07

    NAC panel says technology may not add up

    A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it.

  • March 20, 2007 20 Mar'07

    Symantec says fixing licensing portal top priority

    Company officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November.

  • March 19, 2007 19 Mar'07

    Internet complexity, insecurity could stifle innovation, expert says

    Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says.

  • March 19, 2007 19 Mar'07

    Power over Ethernet power consumption: The hidden costs

    Power over Ethernet (PoE) has many advantages in a VoIP migration, but some companies overlook the amount of power needed to run PoE for VoIP and the costs and cooling requirements that come with it.

  • March 18, 2007 18 Mar'07

    Symantec: Data thieves thrive on zero-day flaws

    According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.

  • March 18, 2007 18 Mar'07

    Cisco stamps on Brocade in Q4, Dell'Oro says

    For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm.

  • March 18, 2007 18 Mar'07

    Hacker techniques use Google to unearth sensitive data

    Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.

  • March 18, 2007 18 Mar'07

    VoIP security worries are plentiful, potent

    VoIP creates a new set of security issues for your network, as expert Ed Skoudis explains.

  • March 18, 2007 18 Mar'07

    New gigabit standard: How fast is fast enough?

    Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are working on increasing this standard to potentially 40 ...

  • March 15, 2007 15 Mar'07

    Cisco buys WebEx for $3.2 billion

    Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications.

  • March 15, 2007 15 Mar'07

    Open source IP telephony on hold?

    Is open source telephony ready for your business? Read on to learn if it's the real deal.

  • March 15, 2007 15 Mar'07

    Carrier MPLS support for VoIP

    Achieving QoS for reliable voice transmissions can be the biggest challenge of deploying VoIP. Multi-Protocol Label Switching (MPLS) might be the answer!

  • March 14, 2007 14 Mar'07

    Podcast: Security360 - SOA, Web Services Security

    ZapThink analyst Jason Bloomberg offers an overview of the security issues unique to SOA environments, while executives from SAP and Oracle discuss how they address SOA security in their software.

  • March 14, 2007 14 Mar'07

    Emulex launches storage virtualization appliance

    Emulex has packaged a chip from its Aarohi acquisition into an appliance that could be a lower cost hardware platform for storage virtualization software products.

  • March 13, 2007 13 Mar'07

    NEC reveals HydraStor grid storage

    NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication.

  • March 13, 2007 13 Mar'07

    What are some best practices for retaining data in a highly regulated business environment?

    Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long...

  • March 12, 2007 12 Mar'07

    VoiceCon Spring 2007: More news from the show

    Unified communications and VoIP were big topics at VoiceCon Spring 2007. Here are some news highlights from the show.

  • March 11, 2007 11 Mar'07

    Wi-Fi interference

    In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs.

  • March 08, 2007 08 Mar'07

    Review: eGuardPost a B+ overall

    eGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities.

  • March 08, 2007 08 Mar'07

    Review: Sun Java System Identity Manager 7.0 'impressive'

    Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing.

  • March 07, 2007 07 Mar'07

    Microsoft outlines software-centric VoIP, UC

    Microsoft unveils its vision of a software-based VoIP system to enable unified communications.

  • March 07, 2007 07 Mar'07

    Microsoft cancels Patch Tuesday as DST looms

    IT administrators who are struggling to apply all their daylight-saving time (DST) patches will get a break from Microsoft next week, as no new security fixes will be released.

  • March 07, 2007 07 Mar'07

    Symantec acquires automated risk assessment firm

    Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up.

  • March 07, 2007 07 Mar'07

    Microsoft outlines software-centric VoIP, UC

    Microsoft unveils its vision of a software-based VoIP system to enable unified communications.

  • March 06, 2007 06 Mar'07

    Tape restoration firm accelerates restores

    National Data Conversion uses Index Engines technology to speed up tape restores for litigation.

CIO
Security
Networking
Data Center
Data Management
Close