News

News Archive

  • August 16, 2007 16 Aug'07

    Voice over IPv6: Architectures for Next Generation VoIP Networks

    VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those ...

  • August 16, 2007 16 Aug'07

    TJX profit takes hit over data breach

    TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.

  • August 15, 2007 15 Aug'07

    VoIP models and services: Complete guide

    With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs.

  • August 15, 2007 15 Aug'07

    Latest Microsoft flaws affect Windows, IE, Excel

    Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS.

  • August 14, 2007 14 Aug'07

    QoS -- What voice managers need to know

    Quality of Service (QoS) technologies can be quite confusing between technical complexities and marketing jargon. In this tip, find out what voice managers need to know about QoS as it relates to VoIP.

  • August 14, 2007 14 Aug'07

    Novell to acquire Senforce for endpoint security

    Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite.

  • August 14, 2007 14 Aug'07

    Apple iPhone to provoke complex mobile attacks, expert warns

    Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.

  • August 14, 2007 14 Aug'07

    Telstra network build spurs new security plan

    Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy.

  • August 13, 2007 13 Aug'07

    EMC cashes in with VMware IPO

    EMC officially spins off part of its server virtualization subsidiary to the tune of $1.1B. Analysts are hoping the windfall will lead to deeper storage partnerships.

  • August 13, 2007 13 Aug'07

    Data backup copies overview

    How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity.

  • August 13, 2007 13 Aug'07

    Fibre-optic networks: Access network design

    Fibre-optic technology in access networks is expanding due to the demand for broadband. Learn about FTTX and passive optical networking (PON) systems.

  • August 13, 2007 13 Aug'07

    VoIP vulnerability threatens data

    VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.

  • August 13, 2007 13 Aug'07

    Gartner security summit outlines 'Security 3.0'

    Gartner has opened its Sydney Security Summit with a definition of Security 3.0.

  • August 12, 2007 12 Aug'07

    Implementing video on demand

    Video on demand (VoD), in at least some of its potential service models, is perhaps the most challenging of all network applications. Implementation of VoD should be should be undertaken in three particular steps.

  • August 12, 2007 12 Aug'07

    IPv6 from 'CCNA Portable Command Guide', Chapter 25

    IPv6, 'CCNA Portable Command Guide,' Chapter 25, explains IPv6 address assignment, static routes in IPv6, IPv6 ping, IPv6 tunnels and RIPng. Learn all you need to know to pass the IPv6 questions on your Cisco Certified Network Associate exam.

  • August 10, 2007 10 Aug'07

    SMEs’ CRM needs catered for in Sage 200

    Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200.

  • August 09, 2007 09 Aug'07

    Buying Guide for NAS management software

    Learn the key evaluation factors for purchasing NAS management software in this Buying Guide.

  • August 09, 2007 09 Aug'07

    NAS appliance purchase considerations

    NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...

  • August 09, 2007 09 Aug'07

    Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'

    Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...

  • August 09, 2007 09 Aug'07

    Sun adds virtual tape library to Thumper

    Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.

  • August 09, 2007 09 Aug'07

    Cisco warns of critical IOS flaws

    Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.

  • August 09, 2007 09 Aug'07

    IT pros impede PCI, Sarbanes Oxley compliance

    The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.

  • August 09, 2007 09 Aug'07

    VeriSign employee data exposed in laptop theft

    Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.

  • August 09, 2007 09 Aug'07

    VoIP vulnerability threatens data

    VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.

  • August 09, 2007 09 Aug'07

    Immunity releases new exploit-writing tool

    Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.

  • August 09, 2007 09 Aug'07

    Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'

    Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...

  • August 08, 2007 08 Aug'07

    NAS appliance specifications

    NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...

  • August 08, 2007 08 Aug'07

    NAS management software specifications

    Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...

  • August 08, 2007 08 Aug'07

    Cisco warns of critical IOS flaws

    Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.

  • August 08, 2007 08 Aug'07

    New iSCSI SAN/NAS box touts better performance

    Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features.

  • August 08, 2007 08 Aug'07

    Mozilla to extend security in major Firefox update

    The next version of Firefox will include new anti-phishing and anti-malware capabilities. Mozilla also plans to release a pair of fuzzing tools to detect Java, FTP and HTTP flaws.

  • August 08, 2007 08 Aug'07

    Wi-Fi simplicity edging out Wi-Fi security

    Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.

  • August 08, 2007 08 Aug'07

    EMC's RSA to acquire Tablus for data loss prevention

    RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software.

  • August 08, 2007 08 Aug'07

    WLANs require investment to yield benefits, study says

    WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.

  • August 08, 2007 08 Aug'07

    IP address depletion hastens IPv6 adoption

    IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how much work network operators will face.

  • August 08, 2007 08 Aug'07

    WLANs require investment to yield benefits, study says

    WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.

  • August 08, 2007 08 Aug'07

    NAS gateway specifications

    A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...

  • August 08, 2007 08 Aug'07

    New iSCSI SAN/NAS box touts better performance

    Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features

  • August 08, 2007 08 Aug'07

    NAS gateway purchase considerations

    NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...

  • August 07, 2007 07 Aug'07

    Application-aware storage promises intelligence and automation

    Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is ...

  • August 07, 2007 07 Aug'07

    Subpar security compromises compliance

    Pressure to keep trading applications available has nudged security to the back of the development line.

  • August 06, 2007 06 Aug'07

    Video networks: The fundamental structure

    Video delivery, content network, IPTV, triple play -- these are just a few of the terms used today for video over broadband data networks. This concept of video networks is an increasing challenge, and like most network challenges, this one is ...

Search CIO
Search Security
Search Networking
Search Data Center
Search Data Management
Close