News
News Archive
-
February 14, 2007
14
Feb'07
Cancer clinic juggles two-tiered storage environments
Karmanos Cancer Institute is using two separate tiered storage systems from EMC and Sun, and says it has yet to find a single storage vendor that can meet all its requirements.
-
February 14, 2007
14
Feb'07
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...
-
February 13, 2007
13
Feb'07
Fortune 500 firm takes a crack at data classification
A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done.
-
February 12, 2007
12
Feb'07
Mobile carriers admit to malware attacks
Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small.
-
February 12, 2007
12
Feb'07
Microsoft fixes zero-day flaws in Word, Office
Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office.
-
February 12, 2007
12
Feb'07
Siemens' acquisition of UGS 'will benefit users'
-
February 12, 2007
12
Feb'07
Skype makes more enterprise inroads
Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise.
-
February 11, 2007
11
Feb'07
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy.
-
February 11, 2007
11
Feb'07
Solaris 10 has zero-day Telnet flaw
Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.
-
February 11, 2007
11
Feb'07
Cybersecurity czar signals government cooperation at RSA Conference
Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats.
-
February 11, 2007
11
Feb'07
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy.
-
February 11, 2007
11
Feb'07
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...
-
February 10, 2007
10
Feb'07
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...
-
February 10, 2007
10
Feb'07
Cisco VoIP management guide: VoIP management lifecycle
VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements.
-
February 10, 2007
10
Feb'07
Cisco VoIP management guide: Cisco requires proactive management
Managing Cisco VoIP solutions means network managers must rely on credible, experienced vendors to some extent. Fortunately, many vendors have emerged as trusted, viable partners that can offer an end-to-end management solution for Cisco VoIP ...
-
February 10, 2007
10
Feb'07
Cisco VoIP management guide: Enterprise VoIP management solutions
Enterprise VoIP management solutions require two considerations: the scale of production environment and the need to extend support resources with a systems integrator or service provider.
-
February 10, 2007
10
Feb'07
Cisco management guide: Selecting a VoIP solution
Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products.
-
February 10, 2007
10
Feb'07
Cisco VoIP management guide: Recommendations and summary
Enterprises now have solid choices of management solutions for their Cisco VoIP deployment. The short list for any enterprise should include Prognosis, Infovista, or Cisco.
-
February 10, 2007
10
Feb'07
Cisco management guide: Selecting a VoIP solution
Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products.
-
February 10, 2007
10
Feb'07
Cisco VoIP management guide: Recommendations and summary
Enterprises now have solid choices of management solutions for their Cisco VoIP deployment. The short list for any enterprise should include Prognosis, Infovista, or Cisco.
-
February 08, 2007
08
Feb'07
New storage IPOs report losses
Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies.
-
February 08, 2007
08
Feb'07
Roundup: Vista security, breakability touted at RSA Conference
At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking.
-
February 07, 2007
07
Feb'07
VoIP capabilities save hotel money, keep guests connected
"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities.
-
February 07, 2007
07
Feb'07
Briefs: Vulnerabilities found in Trend Micro, Firefox browser
This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws.
-
February 07, 2007
07
Feb'07
EMC plans array-based encryption via PowerPath
EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage.
-
February 07, 2007
07
Feb'07
Download SAN Guide Chapter 1: Management (PDF)
You asked for it, so here it is -- a printable version of our SAN All-In-One Guide. Download Chapter 1: Management in .pdf format now.
-
February 07, 2007
07
Feb'07
VoIP security, unified communications need questioned
VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies.
-
February 07, 2007
07
Feb'07
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Part two of our series on securing the OSI stack looks at the perils of Address Resolution Protocol.
-
February 06, 2007
06
Feb'07
IP storage adoption plows ahead bringing tangible benefits
According to IDC, there were 32,124 terabytes (TB) of iSCSI storage deployed worldwide in 2005. That figure had almost tripled to 97,506 TB by 2006. IDC expects that figure to triple again in 2007 to over 320,000 TB of iSCSI storage, with almost 4 ...
-
February 06, 2007
06
Feb'07
Attackers hit computers that manage Internet traffic
Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage.
-
February 06, 2007
06
Feb'07
VoIP predictions for 2007: Best bets from VoIP experts
How will the VoIP and networking markets evolve over 2007? SearchVoIP experts, Carrie Higbie and Juan Pablo Pazos, and our valued site members, put their cards on the table about the 2007 VoIP market and other important networking trends.
-
February 05, 2007
05
Feb'07
VoIP security, unified communications need questioned
VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies, according to CompTIA's recent survey.
-
February 05, 2007
05
Feb'07
Rootkit dangers at an 'all-time high'
Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users.
-
February 05, 2007
05
Feb'07
Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...
-
February 05, 2007
05
Feb'07
Acopia hypes heterogeneous snapshot
The file virtualisation startup is blustering about a demonstration of heterogeneous snapshot technology, but is being coy about releasing a product.
-
February 05, 2007
05
Feb'07
Gates to outline Microsoft's new strategy for secure computing
Bill Gates is back at RSA. At this year's conference, Gates plans to speak about the evolution of authentication, network policies and data protection, signaling a change in his vision of a "Digital Decade."
-
February 05, 2007
05
Feb'07
Coviello: In 3 years, no more stand-alone security
RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure.
-
February 05, 2007
05
Feb'07
Do all the vendors offer unified storage?
No. Some vendors are moving in that direction and others have a limited number of OEM product offerings now. However, several vendors currently offer established products...
-
February 05, 2007
05
Feb'07
Is there any reliability difference with unified storage?
There are a few minor differences, but usually not a significant difference...
-
February 05, 2007
05
Feb'07
CA backup bug exploitable on Vista
In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ...
-
February 05, 2007
05
Feb'07
What are the disadvantages of unified storage over independent block and file systems?
There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data and block-based data is significantly different...
-
February 05, 2007
05
Feb'07
What is the advantage of having unified storage?
There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based access or a complicated block-based storage system...
-
February 05, 2007
05
Feb'07
What will be the impact on performance when mixing block and file in the same system?
Caching difficulties are one concern since caching patterns may not be optimized for block-based storage...
-
February 05, 2007
05
Feb'07
Will all storage systems be unified storage in the future?
I don't think that "all" storage systems will be unified...
-
February 05, 2007
05
Feb'07
What does unified storage really mean?
This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a single storage system that can support both file and block access...
-
February 05, 2007
05
Feb'07
What about the system features, like snapshot and remote replication?
At this point in time, most customers expect to have these features in both block- and file-based storage products...
-
February 05, 2007
05
Feb'07
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.
-
February 05, 2007
05
Feb'07
Are there any differences in operations between unified storage and my existing storage systems?
Normally, a block storage system is handled by a storage professional or storage administrator...
-
February 05, 2007
05
Feb'07
Does it cost extra for unified storage?
For a lot of NAS-based systems -- even Windows Storage Server (WSS) with an iSCSI target unified storage capability is probably...
-
February 05, 2007
05
Feb'07
RSA Conference 2007: Product announcements
RSA Conference 2007: Product announcements