News

News Archive

  • November 08, 2006 08 Nov'06

    Microsoft to patch critical zero-day flaws in Windows

    Microsoft plans to repair five critical flaws in Windows and a flaw in XML Core Services as part of its monthly patch update next week.

  • November 08, 2006 08 Nov'06

    High-end clustering users contemplate snapshots

    Some users and analysts say the line between high-performance NAS clusters and enterprise NAS systems continues to blur as clustering vendors begin to include enterprise features.

  • November 08, 2006 08 Nov'06

    The big security/storage crossover: Is your job safe? [Part Two: The analyst]

    Storage and security staff sometimes possess the same skills. What does that mean for your job prospects in the field? In this second part of a four part series, TechTarget ANZ asks Gartner's Phil Sergeant what lies ahead for professionals in these ...

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 6

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 8

    Big pay for storage jobs, page 8

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 3

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 7

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 4

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 5

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Mozilla fixes Firefox flaws

    Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 2

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    NetApp to acquire Topio

    Six months after EMC acquired heterogeneous replication provider Kashya, NetApp jumps on the bandwagon by announcing plans to acquire Topio for $160M.

  • November 07, 2006 07 Nov'06

    VMware backup still tough

    VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • November 06, 2006 06 Nov'06

    Agency improves security grades under CISO's watch

    CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award.

  • November 06, 2006 06 Nov'06

    Softek rides IBM mainframe wave, plans acquisition

    Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business.

  • November 06, 2006 06 Nov'06

    Sourcefire IPO could fuel Snort, users say

    Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public.

  • November 06, 2006 06 Nov'06

    The big security/storage crossover: Is your job safe? [Part One: The recruiter]

    Since EMC acquired RSA and Symantec enveloped Veritas, both have started discussing 'protection' of data as the sensible sequel to both storage and security. In the first of a four part series series, TechTarget ANZ asks several industry experts ...

  • November 05, 2006 05 Nov'06

    Microsoft eyes second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.

  • November 05, 2006 05 Nov'06

    NetApp adds a midrange box, tunes up software

    NetApp adds the FAS3070 to its midrange lineup to compete with EMC's CX3-80 and updates a number of its software products.

  • November 05, 2006 05 Nov'06

    Mobile device encryption - a practice not often applied

    Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology.

  • November 02, 2006 02 Nov'06

    Review: SPI Dynamics' WebInspect 6.1

    SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves.

  • November 02, 2006 02 Nov'06

    Reporter's Notebook: Whispers and rumbles from SNW

    Floridians talked DR, big guys quibbled over deduplication, and rumors of acquisitions and new products to come flew at SNW Orlando this year.

  • November 01, 2006 01 Nov'06

    Tor network privacy could be cracked

    The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.

  • November 01, 2006 01 Nov'06

    Juniper Networks' enterprise router takes aim at Cisco branches

    Juniper's new branch office J-Series routers provide all-in-one security, VoIP, WAN acceleration box to rival Cisco's ISR router.

  • November 01, 2006 01 Nov'06

    VoIP convergence: Managing staffing issues

    Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them.

  • November 01, 2006 01 Nov'06

    What is a seamless router?

    In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?"

  • November 01, 2006 01 Nov'06

    Exploit code released for Apple Wi-Fi flaw

    Details on how to attack a flaw in Apple's wireless software were released as part of a new project called the "Month of Kernel Bugs."

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 31, 2006 31 Oct'06

    E-vaulting's many faces can confuse IT efforts

    E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...

  • October 31, 2006 31 Oct'06

    Five years until FAN's a hit: Brocade Australia

    File Area Networks (FANs) will take around five years to become a ubiquitous piece of enterprise storage infrastructure, according to Graham Schultz, Brocade's Country Manager for Australia.

  • October 31, 2006 31 Oct'06

    Internode covers Coorong with solar-powered broadband

    Internode has blended super-fast ADSL2+ broadband with solar-powered microwave towers to deliver virtually total broadband coverage across South Australia's largest local government region.

  • October 31, 2006 31 Oct'06

    Zero-day attacks target Microsoft Visual Studio

    Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005.

  • October 31, 2006 31 Oct'06

    In IT security, vendor size does not compute

    With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the biggest firms aren't necessarily the most prudent investment.

  • October 31, 2006 31 Oct'06

    Net neutrality: All or nothing, or somewhere in between?

    The notion of net neutrality can hinder VoIP QoS guarantees and thus has incited a contentious debate.