News
News Archive
-
August 20, 2007
20
Aug'07
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology.
-
August 20, 2007
20
Aug'07
3PAR, EqualLogic file for IPOs
The emerging storage companies file S-1 forms with the SEC, though some experts warn they could be headed for a volatile market.
-
August 19, 2007
19
Aug'07
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications.
-
August 19, 2007
19
Aug'07
Push voice is the next mobility must-have
Push voice, coupled with mobile email, has the potential to make the smartphone a true mobile office.
-
August 19, 2007
19
Aug'07
Your networking certification game plan
To pass your networking certification exams, use these suggested lab setups, activities and reading materials to CompTIA A+, MCSE, Network+, MCSA, CCNA and Linux+ certify.
-
August 17, 2007
17
Aug'07
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network.
-
August 17, 2007
17
Aug'07
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity.
-
August 17, 2007
17
Aug'07
Compliance, data breaches heighten database security needs
Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements.
-
August 16, 2007
16
Aug'07
Voice over IPv6: Architectures for Next Generation VoIP Networks
VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those ...
-
August 16, 2007
16
Aug'07
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.
-
August 15, 2007
15
Aug'07
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs.
-
August 15, 2007
15
Aug'07
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS.
-
August 14, 2007
14
Aug'07
QoS -- What voice managers need to know
Quality of Service (QoS) technologies can be quite confusing between technical complexities and marketing jargon. In this tip, find out what voice managers need to know about QoS as it relates to VoIP.
-
August 14, 2007
14
Aug'07
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite.
-
August 14, 2007
14
Aug'07
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.
-
August 14, 2007
14
Aug'07
Telstra network build spurs new security plan
Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy.
-
August 13, 2007
13
Aug'07
EMC cashes in with VMware IPO
EMC officially spins off part of its server virtualization subsidiary to the tune of $1.1B. Analysts are hoping the windfall will lead to deeper storage partnerships.
-
August 13, 2007
13
Aug'07
Data backup copies overview
How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity.
-
August 13, 2007
13
Aug'07
Fibre-optic networks: Access network design
Fibre-optic technology in access networks is expanding due to the demand for broadband. Learn about FTTX and passive optical networking (PON) systems.
-
August 13, 2007
13
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 13, 2007
13
Aug'07
Gartner security summit outlines 'Security 3.0'
Gartner has opened its Sydney Security Summit with a definition of Security 3.0.
-
August 12, 2007
12
Aug'07
Implementing video on demand
Video on demand (VoD), in at least some of its potential service models, is perhaps the most challenging of all network applications. Implementation of VoD should be should be undertaken in three particular steps.
-
August 12, 2007
12
Aug'07
IPv6 from 'CCNA Portable Command Guide', Chapter 25
IPv6, 'CCNA Portable Command Guide,' Chapter 25, explains IPv6 address assignment, static routes in IPv6, IPv6 ping, IPv6 tunnels and RIPng. Learn all you need to know to pass the IPv6 questions on your Cisco Certified Network Associate exam.
-
August 10, 2007
10
Aug'07
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200.
-
August 09, 2007
09
Aug'07
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide.
-
August 09, 2007
09
Aug'07
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...
-
August 09, 2007
09
Aug'07
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...
-
August 09, 2007
09
Aug'07
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.
-
August 09, 2007
09
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 09, 2007
09
Aug'07
IT pros impede PCI, Sarbanes Oxley compliance
The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.
-
August 09, 2007
09
Aug'07
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.
-
August 09, 2007
09
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 09, 2007
09
Aug'07
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.
-
August 09, 2007
09
Aug'07
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...
-
August 08, 2007
08
Aug'07
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...
-
August 08, 2007
08
Aug'07
NAS management software specifications
Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...
-
August 08, 2007
08
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 08, 2007
08
Aug'07
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features.
-
August 08, 2007
08
Aug'07
Mozilla to extend security in major Firefox update
The next version of Firefox will include new anti-phishing and anti-malware capabilities. Mozilla also plans to release a pair of fuzzing tools to detect Java, FTP and HTTP flaws.
-
August 08, 2007
08
Aug'07
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.
-
August 08, 2007
08
Aug'07
EMC's RSA to acquire Tablus for data loss prevention
RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
IP address depletion hastens IPv6 adoption
IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how much work network operators will face.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
NAS gateway specifications
A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...
-
August 08, 2007
08
Aug'07
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features
-
August 08, 2007
08
Aug'07
NAS gateway purchase considerations
NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...
-
August 07, 2007
07
Aug'07
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is ...
-
August 07, 2007
07
Aug'07
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line.
-
August 06, 2007
06
Aug'07
Video networks: The fundamental structure
Video delivery, content network, IPTV, triple play -- these are just a few of the terms used today for video over broadband data networks. This concept of video networks is an increasing challenge, and like most network challenges, this one is ...