News
News Archive
-
June 03, 2007
03
Jun'07
IBM: We're No. 1 in storage hardware
A new combined disk and tape tracker from IDC has IBM trumpeting from the rooftops that it's the market leader. But what's IBM's story when it comes to software?
-
June 03, 2007
03
Jun'07
Speech technology needs to be more natural to be useful
Once speech technology irons out a few issues, it will become an integral component of many applications and will significantly alter how we access information. In this tip, learn how you can benefit from getting in on this up-and-coming technology.
-
June 01, 2007
01
Jun'07
Top spammer indicted on email fraud, identity theft
The arrest may reduce the volume of spam in the short-term, say experts and analysts, but the real spam threat comes from criminal gangs based in Asia and Russia.
-
June 01, 2007
01
Jun'07
Sclavos's VeriSign departure leaves many questions unanswered
Some industry observers say disagreements fueled his resignation, but others say Sclavos's abrupt departure revolved around his role in VeriSign's options accounting practices.
-
June 01, 2007
01
Jun'07
Check Point promises more VoIP security, fewer slowdowns
Check Point's enhanced Open Performance Architecture is designed for deeper security of technologies like VoIP without the network performance problems that often come with it.
-
June 01, 2007
01
Jun'07
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined.
-
June 01, 2007
01
Jun'07
Google dives into security market
Search engine giant Google has acquired security startup GreenBorder Technologies, making it a bigger player in the wider information security market.
-
June 01, 2007
01
Jun'07
HDS adds SAN muscle to archive
Hitachi Data Systems integrates its archive software across its product line and adds important new features, including replication, data deduplication and security.
-
May 31, 2007
31
May'07
VoIP rush heats up cooling debate
Increased VoIP adoption is putting pressure on data centres' power and cooling requirements
-
May 31, 2007
31
May'07
It's cool to think about heat
If you're not thinking about power and cooling, you're behind the curve.
-
May 31, 2007
31
May'07
Cisco, Nortel frontrunners in Avaya acquisition rumors
Cisco and Nortel are said to be amongst those circling the still-live body of VoIP vendor Avaya, but analysts disagree on which, and why.
-
May 31, 2007
31
May'07
HDS CEO quits for HP storage biz
Dave Roberson, CEO of Hitachi Data Systems since 2006, has jumped ship to HP to run the server giant's storage business.
-
May 30, 2007
30
May'07
Brocade gets into the HBA business
Experts say the move, based on a partnership with LSI, could lower HBA pricing across the board and be the first step toward a Brocade-developed storage virtualization product.
-
May 29, 2007
29
May'07
SAN School: Table of contents
What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School.
-
May 29, 2007
29
May'07
The wireless future offers plenty of voice possibilities
Farpoint Group's Craig Mathias surveys the future of wireless networks and their ability to carry voice traffic.
-
May 29, 2007
29
May'07
Bridging VoIP islands
WAN optimisation makes it possible to connect campus VoIP connections
-
May 25, 2007
25
May'07
VoIP advice from the trenches
ITKE, or ITKnowledge Exchange, is simply a cool (and quick) way to get a response to your VoIP-related questions.
-
May 24, 2007
24
May'07
Data retrieval strategies: Retrieving email and database archives overview
This overview focuses on the considerations involved in email and database archives with an emphasis on retention and search to meet legal discovery requirements.
-
May 24, 2007
24
May'07
Microsoft NAP-TNC compatibility won't speed adoption, users say
Users hail the new compatibility of Microsoft NAP and the Trusted Computing Group's TNC architecture. But they say it won't speed up their adoption timetables.
-
May 24, 2007
24
May'07
McAfee launches IPS for 10g networks, but is IT ready?
McAfee unveiled a new IPS offering for 10-gigabit Ethernet networks and announced the upgrade and integration of several other products. One analyst offers a mixed assessment.
-
May 24, 2007
24
May'07
Microsoft fixes Office 2007 patch issues, releases MOICE
The Microsoft Security Response Center acknowledged that some of the company's May 8 security updates didn't make it to machines running Office 2007 on Windows Vista.
-
May 24, 2007
24
May'07
Symantec, Huawei form joint storage, security company
Symantec has formed a joint venture with storage and networking hardware company Huawei and indicated jointly developed products are coming to the US
-
May 24, 2007
24
May'07
Sourcefire, Nmap deal to open vulnerability scanning
Sourcefire and Insecure.org have inked an agreement to develop open source vulnerability scanning tools based on Insecure's Nmap scripting engine.
-
May 24, 2007
24
May'07
IETF approves new weapon to fight spam, phish
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
-
May 24, 2007
24
May'07
Microsoft investigates new Office zero-day flaw
Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned.
-
May 24, 2007
24
May'07
Cisco, EMC partner on SAN encryption
Cisco will ship encryption in switches later this year integrated with EMC's RSA key management software. Users are curious but cautious about its impact on other services.
-
May 22, 2007
22
May'07
Mitel acquires Inter-Tel, signaling more consolidation to come
Mitel acquired Inter-Tel last week, signaling a trend toward vendor consolidation in the VoIP market and creating stronger options for SMBs.
-
May 22, 2007
22
May'07
Microsoft unveils unified communications devices
Microsoft unveils unified communications devices.
-
May 22, 2007
22
May'07
Selling network certification: How to talk up your credentials to current and future employers
Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value.
-
May 21, 2007
21
May'07
Cisco warns of new IOS flaws
The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said.
-
May 21, 2007
21
May'07
EMC users push for better power consumption
EMC announces a 1.8 PB VTL, deduplication for VMware and bare-metal restore for servers as users caution the company to stay focused on everyday problems, such as power consumption.
-
May 21, 2007
21
May'07
Mobile instant messaging enhances company's business processes
A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes.
-
May 21, 2007
21
May'07
Microsoft, TCG partner on network access control; Cisco takes own route
Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that Microsoft's Network Access Protection (NAP)...
-
May 20, 2007
20
May'07
Learn NetStar's secret to success
NetStar is a systems integrator and managed service provider and also a survivor of the dot.com crash. The company secured venture capital funding way back at the turn of the century and has put the money to good use, eschewing the ebony ...
-
May 17, 2007
17
May'07
VoIP security fundamentals
VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...
-
May 16, 2007
16
May'07
Screencast: How to configure a UTM device
In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.
-
May 16, 2007
16
May'07
When signature based antivirus isn't enough
Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.
-
May 11, 2007
11
May'07
Choosing WAN providers: Key questions to ask
When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these ...
-
May 11, 2007
11
May'07
Cisco fixes fresh flaws in IOS
Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.
-
May 11, 2007
11
May'07
VoIP, unified communications adoption continue to rise
VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report.
-
May 10, 2007
10
May'07
EMC buys Indigo Stone for bare-metal restore
EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions.
-
May 09, 2007
09
May'07
Symantec fixes flaws in Norton, pcAnywhere
Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.
-
May 08, 2007
08
May'07
Companies plug FTP holes with secure FTP servers
Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.
-
May 08, 2007
08
May'07
What top five subjects does the CCNA test focus on?
Know what subjects are tested most heavily on in the CCNA exam. Use this top five list from Cisco certifications expert Dave Minutella in this response.
-
May 08, 2007
08
May'07
ISCSI TCP/IP TOE card specifications
One means of improving iSCSI traffic performance is to include TOE (TCI/IP Offload Engine) capability on the Ethernet card itself. An iSCSI TOE allows the network adapter to process iSCSI traffic (often all Ethernet LAN traffic) locally -- relieving...
-
May 07, 2007
07
May'07
Is RAID in general an obsolete technology today?
This is a technology that is so commonly used, so transparent, that we really don't even think about it...
-
May 07, 2007
07
May'07
What are the most important new disk drive technologies?
The first 1 terabyte hard disk drives have appeared. What will be the impact of hard disk drive technologies such as perpendicular recording, 2.5-inch high-performance drives, secure erase, encryption and hybrid technology drives?
-
May 06, 2007
06
May'07
Intransa launches 10 GigE IP SAN
Intransa is now shipping a standalone 10 GigE system, but it may take a while for applications and operating systems to be ready for the big pipe.
-
May 03, 2007
03
May'07
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.