News
News Archive
-
October 11, 2006
11
Oct'06
Briefs: VoIP management; mobile E911; and Windows 2003 support
Qovia releases its new VoIP management system; 911 Enable made E911 mobile and Codima announced support for Windows 2003 server.
-
October 11, 2006
11
Oct'06
Sun clarifies disk storage strategy
Sun execs at StorageTek Forum say they plan to keep (but streamline) most of the disk storage portfolio -- but did not deny rumors about plans to sell off the 6920 array.
-
October 10, 2006
10
Oct'06
McAfee CEO Samenuk retires in wake of options probe
The investigation into stock option grants is complete and company president Kevin Weiss has been fired, as well.
-
October 10, 2006
10
Oct'06
Google Code Search gives security experts a sinking feeling
The new search tool from Google can help developers find useful code examples. But security experts worry that it also will make attackers' jobs that much easier.
-
October 09, 2006
09
Oct'06
Banking on the future
As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector?
-
October 09, 2006
09
Oct'06
Isilon adds snapshots, makes play for mainstream NAS
Users and analysts say Isilon's new snapshot features are a challenge to NetApp, but the NAS cluster specialist still has a way to go to compete in the enterprise.
-
October 09, 2006
09
Oct'06
Midmarket IT pros have NAC for identity, access management
Midmarket firms may not have the budgets of large companies, but IT pros can build identity and access management programs that are as effective as what the big guys have.
-
October 09, 2006
09
Oct'06
Symantec unveils Security 2.0 initiative
As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft.
-
October 04, 2006
04
Oct'06
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...
-
October 04, 2006
04
Oct'06
ISCSI gains strength from servers
More powerful servers are helping ease some performance concerns for users considering IP SANs, but others say they still want to see more improvement.
-
October 03, 2006
03
Oct'06
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.
-
October 03, 2006
03
Oct'06
3Com rolls out unified SMB switch
3Com hit the market today with an all-in-one unified switch for SMBs.
-
October 03, 2006
03
Oct'06
Alliance and Leicester to overhaul core systems
Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme.
-
October 03, 2006
03
Oct'06
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.
-
October 02, 2006
02
Oct'06
Cisco brings video to the enterprise
With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.
-
October 02, 2006
02
Oct'06
Cisco brings video to the enterprise
With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.
-
October 01, 2006
01
Oct'06
Column: The myths and realities of VoIP security
Security is often cited as one of the primary reasons organizations have not deployed VoIP. The biggest VoIP security threat is not making headlines. Zeus Kerravala, Yankee Group analyst, cuts through the hype so network managers can maximize the ...
-
October 01, 2006
01
Oct'06
New exploits target Microsoft's PowerPoint, IE
Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.
-
September 28, 2006
28
Sep'06
Top tech tips from SearchStorage.com
Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.
-
September 27, 2006
27
Sep'06
Users say keeping it simple means keeping one vendor
Despite some potential benefits of heterogeneous shops, users at Storage Decisions say they find sticking with one vendor a better way to survive the storage sprawl.
-
September 26, 2006
26
Sep'06
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'
-
September 26, 2006
26
Sep'06
Stration worm targets Windows machines
The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.
-
September 26, 2006
26
Sep'06
Burton Group: Web application firewall market maturing
Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.
-
September 25, 2006
25
Sep'06
Open source router on par with Cisco, users say
To avoid paying top dollar for Cisco routers, two users say Vyatta's Open Flexible Router is a viable alternative to the proprietary norm, with pluses and minuses, of course.
-
September 25, 2006
25
Sep'06
ISCSI gets a boost from InfiniBand
The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI storage.
-
September 25, 2006
25
Sep'06
IP telephony unites New Orleans nonprofit after Katrina
Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution
-
September 25, 2006
25
Sep'06
IT pros worried about unsecured devices
IT admins keep working to make networks secure even as more unsecured personal gadgets their way into companies.
-
September 24, 2006
24
Sep'06
Hijacked consumer machines target the enterprise
Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price.
-
September 24, 2006
24
Sep'06
Cisco bulks up data center switching
Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.
-
September 24, 2006
24
Sep'06
Apple fixes Mac Wi-Fi flaws
Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.
-
September 24, 2006
24
Sep'06
Cisco bulks up data center switching
Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.
-
September 20, 2006
20
Sep'06
Reporter's notebook: Hidden gems of Interop
The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.
-
September 19, 2006
19
Sep'06
NAC, VPNs and behavior analysis in the Interop spotlight
Security for the enterprise network was emphasised at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.
-
September 18, 2006
18
Sep'06
VoIP user experience tested
Most VoIP monitoring is focused on quality of service, but one new company is taking a different tack and looking at the quality of experience.
-
September 16, 2006
16
Sep'06
Universities lean on each other for better disaster recovery
As another school year begins, colleges and universities are opening their doors to each other in order to get enterprise-level disaster recovery plans working.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage, page 2
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 14, 2006
14
Sep'06
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage, page 3
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 14, 2006
14
Sep'06
Mozilla fixes several Firefox flaws
Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems.
-
September 14, 2006
14
Sep'06
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...
-
September 14, 2006
14
Sep'06
Calling network management vendors: It's time to get on board with VoIP
Despite the hype, full-scale VoIP deployments are hard to find. According to our research at Yankee Group, over 80% of U.S. enterprises have VoIP deployed somewhere in their organization in some shape or form. This includes departmental trials and ...
-
September 12, 2006
12
Sep'06
Dell and EMC: Five more years
Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.
-
September 12, 2006
12
Sep'06
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.
-
September 12, 2006
12
Sep'06
Is there a generic blueprint for an IP-based call center?
Is there a generic blueprint for an IP-based call center? Where could I find one?
-
September 12, 2006
12
Sep'06
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.
-
September 11, 2006
11
Sep'06
VoIP still a confusing area for SMBs
A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology.
-
September 11, 2006
11
Sep'06
Data storage compliance's impact on storage product choices
Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there ...
-
September 11, 2006
11
Sep'06
Security Bytes: Hackers target the Terminator
In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.
-
September 11, 2006
11
Sep'06
Storage IPOs bode well for competition
Analysts say new public players could breathe competitive life into the market, but it all hinges on how well execs can balance the needs of users and shareholders.