News
News Archive
-
November 15, 2006
15
Nov'06
How is average repair time determined for both a TDM PBX and a VoIP system?
I am trying to find some statistics on average time to repair or troubleshoot VoIP and TDM PBX. We heard PBX takes 30 minutes versus VoIP at 4.5 hours -- is this true?
-
November 15, 2006
15
Nov'06
How can VoIP be integrated into an existing PBX system?
I am trying to integrate VoIP into my existing PBX system. I have a Talkswitch 48CVA which supports both PSTN and VoIP lines. My main phone number is a landline which forwards calls to my VoIP line when my status is busy or I do not answer.
-
November 15, 2006
15
Nov'06
EMC, NetApp duke it out in the midrange storage
As NetApp gains market share in midrange storage, EMC makes a rare response to performance claims.
-
November 14, 2006
14
Nov'06
SANS: VoIP, zero-day threats surge
Digital miscreants are using VoIP and a growing pile of zero-day flaws to launch a ferocious wave of targeted, financially-motivated attacks, according to the SANS Institute.
-
November 14, 2006
14
Nov'06
Fiber optic networks vulnerable to attack
Fiber optic networks aren't hack-proof: A savvy attacker can crack them with ease.
-
November 13, 2006
13
Nov'06
Trojan poses as Adobe software update
The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information.
-
November 13, 2006
13
Nov'06
IM, Skype, P2P open security holes: Survey
IM, Skype, Web conferencing and other real-time applications are a major concern to IT, but end users seem to shrug off the risks, a new survey has found.
-
November 13, 2006
13
Nov'06
Firefox antiphishing feature beats Internet Explorer in Mozilla test
A Firefox automated antiphishing feature beat IE 7 in a test conducted by Mozilla, but analysts say large enterprises should focus on spam blocking software.
-
November 12, 2006
12
Nov'06
Wireless device flaw discovered
A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs.
-
November 10, 2006
10
Nov'06
The big security/storage crossover: Is your job safe? [Part Four: The new age of abstraction]
The collision of storage and security will mean chances for professionals in both disciplines to accelerate their careers into areas where strategic and business skills become more important than technical sills alone, according to David Webster, ...
-
November 09, 2006
09
Nov'06
IBM announces 'bulletproofed' midrange arrays
New additions to the DS4000 line will feature built-in batteries and sealed enclosures to be in compliance with the telecom industry's NEBS standard.
-
November 09, 2006
09
Nov'06
The big security/storage crossover: Is your job safe? [Part Three: Why consumers count]
Is the cutting edge of security and storage in business, or in your lounge room? In this third installment in our four part series, Symantec's David Sykes explains why consumer behavior is the key to understanding what lies ahead.
-
November 08, 2006
08
Nov'06
Storage virtualization acquisitions need careful consideration
Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. ...
-
November 08, 2006
08
Nov'06
VoIP security safeguards -- they may be there already
Protecting your VoIP system may be easier than you think, especially since many of the necessary tools are already there.
-
November 08, 2006
08
Nov'06
Microsoft to patch critical zero-day flaws in Windows
Microsoft plans to repair five critical flaws in Windows and a flaw in XML Core Services as part of its monthly patch update next week.
-
November 08, 2006
08
Nov'06
High-end clustering users contemplate snapshots
Some users and analysts say the line between high-performance NAS clusters and enterprise NAS systems continues to blur as clustering vendors begin to include enterprise features.
-
November 08, 2006
08
Nov'06
The big security/storage crossover: Is your job safe? [Part Two: The analyst]
Storage and security staff sometimes possess the same skills. What does that mean for your job prospects in the field? In this second part of a four part series, TechTarget ANZ asks Gartner's Phil Sergeant what lies ahead for professionals in these ...
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 6
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 8
Big pay for storage jobs, page 8
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 3
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 7
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
Big pay for storage jobs
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 4
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 5
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
Mozilla fixes Firefox flaws
Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.
-
November 07, 2006
07
Nov'06
Big pay for storage jobs, page 2
Find out what other storage professionals are being paid in this year's salary survey.
-
November 07, 2006
07
Nov'06
NetApp to acquire Topio
Six months after EMC acquired heterogeneous replication provider Kashya, NetApp jumps on the bandwagon by announcing plans to acquire Topio for $160M.
-
November 07, 2006
07
Nov'06
VMware backup still tough
VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.
-
November 06, 2006
06
Nov'06
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.
-
November 06, 2006
06
Nov'06
Agency improves security grades under CISO's watch
CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award.
-
November 06, 2006
06
Nov'06
Softek rides IBM mainframe wave, plans acquisition
Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business.
-
November 06, 2006
06
Nov'06
Sourcefire IPO could fuel Snort, users say
Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public.
-
November 06, 2006
06
Nov'06
The big security/storage crossover: Is your job safe? [Part One: The recruiter]
Since EMC acquired RSA and Symantec enveloped Veritas, both have started discussing 'protection' of data as the sensible sequel to both storage and security. In the first of a four part series series, TechTarget ANZ asks several industry experts ...
-
November 05, 2006
05
Nov'06
Microsoft eyes second zero-day threat in a week
This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.
-
November 05, 2006
05
Nov'06
NetApp adds a midrange box, tunes up software
NetApp adds the FAS3070 to its midrange lineup to compete with EMC's CX3-80 and updates a number of its software products.
-
November 05, 2006
05
Nov'06
Mobile device encryption - a practice not often applied
Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology.
-
November 02, 2006
02
Nov'06
Review: SPI Dynamics' WebInspect 6.1
SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves.
-
November 02, 2006
02
Nov'06
Reporter's Notebook: Whispers and rumbles from SNW
Floridians talked DR, big guys quibbled over deduplication, and rumors of acquisitions and new products to come flew at SNW Orlando this year.
-
November 01, 2006
01
Nov'06
Tor network privacy could be cracked
The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.
-
November 01, 2006
01
Nov'06
Juniper Networks' enterprise router takes aim at Cisco branches
Juniper's new branch office J-Series routers provide all-in-one security, VoIP, WAN acceleration box to rival Cisco's ISR router.
-
November 01, 2006
01
Nov'06
VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them.
-
November 01, 2006
01
Nov'06
What is a seamless router?
In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?"
-
November 01, 2006
01
Nov'06
Exploit code released for Apple Wi-Fi flaw
Details on how to attack a flaw in Apple's wireless software were released as part of a new project called the "Month of Kernel Bugs."
-
October 31, 2006
31
Oct'06
Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.
-
October 31, 2006
31
Oct'06
E-vaulting's many faces can confuse IT efforts
E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...
-
October 31, 2006
31
Oct'06
Five years until FAN's a hit: Brocade Australia
File Area Networks (FANs) will take around five years to become a ubiquitous piece of enterprise storage infrastructure, according to Graham Schultz, Brocade's Country Manager for Australia.
-
October 31, 2006
31
Oct'06
Internode covers Coorong with solar-powered broadband
Internode has blended super-fast ADSL2+ broadband with solar-powered microwave towers to deliver virtually total broadband coverage across South Australia's largest local government region.
-
October 31, 2006
31
Oct'06
Zero-day attacks target Microsoft Visual Studio
Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005.
-
October 31, 2006
31
Oct'06
In IT security, vendor size does not compute
With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the biggest firms aren't necessarily the most prudent investment.
-
October 31, 2006
31
Oct'06
Net neutrality: All or nothing, or somewhere in between?
The notion of net neutrality can hinder VoIP QoS guarantees and thus has incited a contentious debate.