News

News Archive

  • October 10, 2006 10 Oct'06

    McAfee CEO Samenuk retires in wake of options probe

    The investigation into stock option grants is complete and company president Kevin Weiss has been fired, as well.

  • October 10, 2006 10 Oct'06

    Google Code Search gives security experts a sinking feeling

    The new search tool from Google can help developers find useful code examples. But security experts worry that it also will make attackers' jobs that much easier.

  • October 09, 2006 09 Oct'06

    Banking on the future

    As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector?

  • October 09, 2006 09 Oct'06

    Isilon adds snapshots, makes play for mainstream NAS

    Users and analysts say Isilon's new snapshot features are a challenge to NetApp, but the NAS cluster specialist still has a way to go to compete in the enterprise.

  • October 09, 2006 09 Oct'06

    Midmarket IT pros have NAC for identity, access management

    Midmarket firms may not have the budgets of large companies, but IT pros can build identity and access management programs that are as effective as what the big guys have.

  • October 09, 2006 09 Oct'06

    Symantec unveils Security 2.0 initiative

    As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft.

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • October 04, 2006 04 Oct'06

    ISCSI gains strength from servers

    More powerful servers are helping ease some performance concerns for users considering IP SANs, but others say they still want to see more improvement.

  • October 01, 2006 01 Oct'06

    Column: The myths and realities of VoIP security

    Security is often cited as one of the primary reasons organizations have not deployed VoIP. The biggest VoIP security threat is not making headlines. Zeus Kerravala, Yankee Group analyst, cuts through the hype so network managers can maximize the ...

  • October 01, 2006 01 Oct'06

    New exploits target Microsoft's PowerPoint, IE

    Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.

  • September 28, 2006 28 Sep'06

    Top tech tips from SearchStorage.com

    Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.

  • September 27, 2006 27 Sep'06

    Users say keeping it simple means keeping one vendor

    Despite some potential benefits of heterogeneous shops, users at Storage Decisions say they find sticking with one vendor a better way to survive the storage sprawl.

  • September 26, 2006 26 Sep'06

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

  • September 26, 2006 26 Sep'06

    Stration worm targets Windows machines

    The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.

  • September 26, 2006 26 Sep'06

    Burton Group: Web application firewall market maturing

    Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.

  • September 25, 2006 25 Sep'06

    Open source router on par with Cisco, users say

    To avoid paying top dollar for Cisco routers, two users say Vyatta's Open Flexible Router is a viable alternative to the proprietary norm, with pluses and minuses, of course.

  • September 25, 2006 25 Sep'06

    ISCSI gets a boost from InfiniBand

    The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI storage.

  • September 25, 2006 25 Sep'06

    IP telephony unites New Orleans nonprofit after Katrina

    Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution

  • September 25, 2006 25 Sep'06

    IT pros worried about unsecured devices

    IT admins keep working to make networks secure even as more unsecured personal gadgets their way into companies.

  • September 24, 2006 24 Sep'06

    Hijacked consumer machines target the enterprise

    Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 24, 2006 24 Sep'06

    Apple fixes Mac Wi-Fi flaws

    Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 20, 2006 20 Sep'06

    Reporter's notebook: Hidden gems of Interop

    The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.

  • September 19, 2006 19 Sep'06

    NAC, VPNs and behavior analysis in the Interop spotlight

    Security for the enterprise network was emphasised at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.

  • September 18, 2006 18 Sep'06

    VoIP user experience tested

    Most VoIP monitoring is focused on quality of service, but one new company is taking a different tack and looking at the quality of experience.

  • September 16, 2006 16 Sep'06

    Universities lean on each other for better disaster recovery

    As another school year begins, colleges and universities are opening their doors to each other in order to get enterprise-level disaster recovery plans working.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 2

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 3

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Mozilla fixes several Firefox flaws

    Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems.

  • September 14, 2006 14 Sep'06

    Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...

  • September 14, 2006 14 Sep'06

    Calling network management vendors: It's time to get on board with VoIP

    Despite the hype, full-scale VoIP deployments are hard to find. According to our research at Yankee Group, over 80% of U.S. enterprises have VoIP deployed somewhere in their organization in some shape or form. This includes departmental trials and ...

  • September 12, 2006 12 Sep'06

    Dell and EMC: Five more years

    Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

  • September 12, 2006 12 Sep'06

    Big security fixes for QuickTime, Flash Player

    Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.

  • September 12, 2006 12 Sep'06

    Is there a generic blueprint for an IP-based call center?

    Is there a generic blueprint for an IP-based call center? Where could I find one?

  • September 12, 2006 12 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 11, 2006 11 Sep'06

    VoIP still a confusing area for SMBs

    A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology.

  • September 11, 2006 11 Sep'06

    Data storage compliance's impact on storage product choices

    Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there ...

  • September 11, 2006 11 Sep'06

    Security Bytes: Hackers target the Terminator

    In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.

  • September 11, 2006 11 Sep'06

    Storage IPOs bode well for competition

    Analysts say new public players could breathe competitive life into the market, but it all hinges on how well execs can balance the needs of users and shareholders.

  • September 06, 2006 06 Sep'06

    Fast Guide: VoIP encryption

    A guide to encryption within VoIP networks

  • September 06, 2006 06 Sep'06

    VoIP startup untethers would-be mobile workers from wireline office phones

    VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.

CIO
Security
Networking
Data Center
Data Management
Close