Data centre hardware
Data centre strategy is an increasingly important focus for IT managers, as enterprises look to cut costs and improve energy efficiency. We examine key data centre hardware trends such as virtualisation, consolidation and systems management to help identify the products that are right for your needs.
-
Feature
12 Dec 2024
Google Cloud Platform: Key storage options in the Google Cloud
We survey the key cloud storage offers available from GCP, which include Cloud Storage, Persistent Disk and Filestore, with a range of service levels and app-specific options Continue Reading
-
News
11 Dec 2024
IaaS firm uses Pure Storage as a service for ‘virtual datacentres’
Espresso Gridpoint moved from largely NetApp to Pure Storage FlashBlade file and object for its ‘virtual datacentres’ business model that offers VMware, Hyper-V and ProxMox VMs Continue Reading
By- Antony Adshead, Storage Editor
-
News
01 Aug 2007
Mozilla fixes two critical Firefox flaws
Firefox version 2.0.0.6 addresses critical flaws involving unescaped URLs passing to external programs and privilege escalation. Continue Reading
By- SearchSecurity.com Staff
-
News
31 Jul 2007
Security update fixes Yahoo Widgets flaw
Attackers could exploit a Yahoo Widgets flaw to run malicious code on compromised Windows computers, but a security update is available. Continue Reading
By -
News
30 Jul 2007
New research promises denser disk drives
New research into "magnetic avalanches" offers insight into one cause of disk drive failure and could lead to breakthroughs in density, according to experts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
30 Jul 2007
Warning issued over unpatched Firefox flaw
Vulnerability clearinghouse Secunia and US-CERT have issued advisories about the input validation flaw Continue Reading
By- Robert Westervelt, TechTarget
-
News
24 Jul 2007
Apple iPhone crack discovered by security researchers
Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site. Continue Reading
-
News
23 Jul 2007
PCI compliance costs often underestimated, study finds
Companies are moving forward with PCI DSS projects, but many are underestimating the costs associated with compliance. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
03 Jul 2007
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
News
03 Jul 2007
Data storage startups emerge from stealth
Three new storage firms have come out of stealth mode this June. Analysts predict the next new crop of startups will focus on wireless storage, reporting and alternatives to RAID. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
02 Jul 2007
Are PCI auditors pitching products?
Auditors shouldn't be pitching remediation services or products to bring a company into compliance with PCI DSS rules, but some merchants are reporting the practice Continue Reading
By- Robert Westervelt, TechTarget
-
News
25 Jun 2007
PCI Council hears complaints, suggestions for changes
Companies with the most stringent security technologies endure hurdles to comply with PCI DSS. Some firms are turning to the upcoming Burton Group Catalyst Conference for answers. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
10 May 2007
ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
-
News
07 May 2007
Is RAID in general an obsolete technology today?
This is a technology that is so commonly used, so transparent, that we really don't even think about it... Continue Reading
-
News
07 May 2007
What are the most important new disk drive technologies?
The first 1 terabyte hard disk drives have appeared. What will be the impact of hard disk drive technologies such as perpendicular recording, 2.5-inch high-performance drives, secure erase, encryption and hybrid technology drives? Continue Reading
-
News
24 Apr 2007
Scaling storage networks demands careful consideration
In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to pass storage data between storage devices. This requires the use of IP switches and routers, and can involve the deployment of iSCSI TOE host adapters to offload iSCSI traffic from the local server's CPU. This Buying Guide is intended to help clarify the principle considerations involved scaling storage networks and each chapter offers a set of buying points and product specifications that can help readers identify prospective new scaling products. Continue Reading
-
Feature
24 Apr 2007
Storage consolidation: SRM tools overview
SRM tools are an important part of storage consolidation. They allow admins to monitor the storage environment, allocate and organise available storage, and offer insights into future trends. Continue Reading
-
News
24 Apr 2007
Hitachi launches 1 TB SATA disk drive
Hitachi has taken the wraps off three new products: a 1 TB enterprise SATA disk drive, a 2.5-inch SAS drive and a 300 GB multi-interface drive. Continue Reading
By- Jo Maitland, TechTarget
-
News
17 Apr 2007
Storage consolidation: Disks and disk subsystems overview
Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain Continue Reading
-
News
16 Apr 2007
Storage consolidation: Weighing the pros and cons
Storage consolidation holds out the promise of more efficient storage management. But pitfalls include slower network performance and a difficult data migration process. Continue Reading
-
News
16 Apr 2007
DNS worm strikes at Microsoft flaw
A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers. Continue Reading
-
News
10 Apr 2007
Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources. Continue Reading
-
News
08 Apr 2007
How data deduplication eases storage requirements
Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as data deduplication. This article explains the basic principles of data deduplication, and looks at implementation issues. Continue Reading
-
News
26 Mar 2007
What is the impact of unstructured data on backup and restore and disaster recovery in general?
As data volumes grow, there's a bigger problem meeting recovery time objectives. We depend on our data, and we have set recovery times for our systems that are zero (no downtime) in some cases, though most companies set recovery times from eight to 24 hours... Continue Reading
-
News
22 Mar 2007
Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox. Continue Reading
By- SearchSecurity.com Staff
-
News
22 Mar 2007
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products. Continue Reading
-
Feature
18 Mar 2007
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
By- Darrell Jordan-Smith
-
Feature
18 Mar 2007
Defending mobile devices from viruses, spyware and malware
The nature of threat vectors facing mobile devices, challenges and struggles related to keeping mobile devices secure and strategies Continue Reading
-
News
20 Feb 2007
Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory. Continue Reading
By -
News
14 Feb 2007
New attack technique threatens broadband users
Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming Continue Reading
By -
News
06 Feb 2007
Attackers hit computers that manage Internet traffic
Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage. Continue Reading
By- SearchSecurity.com Staff
-
News
29 Jan 2007
Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Jan 2007
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter. Continue Reading
By- SearchStorage.com Staff
-
News
25 Jan 2007
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system. Continue Reading
By -
Feature
24 Jan 2007
Fujitsu exec says SAS may take years to hit your array
Fujitsu's product development VP talks about the development of SAS, why Fujitsu won't be competing with Hitachi's 1 TB drive and the Star-Trek-like future of disks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
22 Jan 2007
MP slams slow payment of tax credit IT compensation
The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of payment, take US company EDS more than 100 years to pay off in full. Continue Reading
By -
News
22 Jan 2007
EMC and Ibrix elbow out Panasas at Disney Studios
Disney needed a storage overhaul fast after merging with Pixar and making major changes to its upcoming new movie. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
18 Jan 2007
ID theft victim to TJX customers: Mind your data
Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary. Continue Reading
By -
News
17 Jan 2007
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
15 Jan 2007
PatchLink offers solid flaw management
PatchLink Update 6.3 is a solid solution to the enterprise patch management problem and demonstrates its true power in a Windows environment. Continue Reading
By -
News
08 Jan 2007
What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?
InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols... Continue Reading
-
News
07 Jan 2007
Brocade buys Silverback for 10 GigE acceleration chips
Adding another string to its bow, Brocade scoops up IP chip acceleration supplier Silverback Systems for an undisclosed sum. Continue Reading
By- Jo Maitland, TechTarget
-
News
07 Jan 2007
Bug Briefs: OpenOffice vulnerable to attack
Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server. Continue Reading
By- SearchSecurity.com Staff
-
Feature
01 Jan 2007
Top 10 mobile tips of 2006
Review of the popular mobile technical tips of 2006 from our stable of mobile experts; Lisa Phifer, Craig Mathias, Daniel Taylor, Kevin Beaver and Robbie Harrell. Continue Reading
-
News
12 Dec 2006
Mixing SAS and SATA disk drives can cause problems
Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds. Continue Reading
By- Jerome M. Wendt, Contributor
-
Podcast
11 Dec 2006
Podcast: Mobile device threats are real, white-hat hacker says
Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off. Continue Reading
By- SearchSecurity.com Staff
-
Feature
11 Dec 2006
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
News
30 Nov 2006
Symantec blames piracy for Veritas licensing snafu
Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect. Continue Reading
By- SearchStorage.com Editors
-
News
28 Nov 2006
Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs. Continue Reading
By -
News
12 Nov 2006
Wireless device flaw discovered
A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs. Continue Reading
By- SearchSecurity.com Staff
-
News
07 Nov 2006
VMware backup still tough
VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles. Continue Reading
By- Jo Maitland, TechTarget
-
News
31 Oct 2006
Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories. Continue Reading
By -
Feature
29 Oct 2006
Download Advanced Storage Guide Chapter 1: Storage components (PDF)
A printable version of our Advanced Storage All-In-One Guide. Download Chapter 1: Storage components in .pdf format now. Continue Reading
-
News
23 Oct 2006
What storage managers are buying and why, page 6
What storage managers are buying and why Continue Reading
-
Feature
17 Oct 2006
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
News
04 Oct 2006
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and performance into focus, it has yet to reach its full potential in the enterprise. Continue Reading
-
News
14 Sep 2006
Three ways to create clustered storage, page 2
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment. Continue Reading
-
News
12 Sep 2006
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines. Continue Reading
By -
Feature
10 Sep 2006
Storage upstarts are tipping the vendor scales
The big storage vendors are always trying to steal a piece of each other's pie. But some small tech upstarts might play big parts in determining who comes out on top. Continue Reading
-
News
05 Sep 2006
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading
By- Harris Weisman, Contributing Writer
-
News
05 Sep 2006
Proofpoint delivers strong messaging security
Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks. Continue Reading
By- Phoram Mehta, Contributing Writer
-
News
24 Aug 2006
What do tiered storage and ILM have to do with disaster recovery?
That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our high-priority data, we have our medium criticality data and we have our low restore priority data. Continue Reading
-
News
17 Aug 2006
Apple fixes Xsan security flaw
Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available. Continue Reading
By -
Feature
08 Aug 2006
IT bosses preparing for Byte Night
About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to raise £300,000 to combat child homelessness. Continue Reading
By- Computer Weekly reporter
-
News
01 Aug 2006
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA. Continue Reading
By- SearchSecurity.com Staff
-
News
30 Jul 2006
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks. Continue Reading
By- Beth Pariseau, Senior News Writer
- Feature 26 Jul 2006
-
News
16 Jul 2006
Automated provisioning quiz
Take this five-question quiz to see how much you've learned about automated provisioning. Continue Reading
-
News
13 Jul 2006
Security Bytes: Investigators slam VA over data breach
Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports. Continue Reading
By- SearchSecurity.com Staff
-
Feature
13 Jun 2006
UK IT leaders plan a night under the stars for charity
About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to raise £300,000 to combat child homelessness. Continue Reading
-
News
23 May 2006
Sleep out to help homeless children
The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords. Continue Reading
-
News
21 Apr 2006
Battery fault prompts HP laptops recall
Hewlett-Packard is to recall more than 15,000 laptops worldwide because a fault makes them a fire hazard. Continue Reading
By -
Feature
11 Apr 2006
Questions that need to be answered on NHS IT plan
Four years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme. Continue Reading
By -
News
20 Nov 2005
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
By -
News
03 Oct 2005
How to break into a computer that is right at your fingertips
Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer. Continue Reading
-
News
29 Sep 2005
Find out how to bridge the communications gap
Communications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500). Continue Reading
-
News
19 Sep 2005
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Continue Reading
-
Feature
13 Sep 2005
IT professionals set for annual charity sleep-out
Senior IT professionals are gearing up to on London's Embankment near Tower Bridge on Friday 23 September 2005. The aim is to raise more than £250,000 for disadvantaged children. Continue Reading
-
News
11 Sep 2005
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
06 Aug 2005
Trusted Computing Group releases server specs
The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches. Continue Reading
By- Luke Meredith, News Writer
-
News
12 Jul 2005
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts. Continue Reading
-
News
09 May 2005
Computer Weekly wins top honour
ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for... Continue Reading
-
News
21 Mar 2005
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
By- Anne Saita, TechTarget
-
Feature
16 Mar 2005
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
News
25 Feb 2005
Intel offers 64-bit desktop processors
Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid... Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Feb 2005
Strategic Storage: DR planning blueprint
Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan and you'll be stuck with the root canal of recovering your data. Continue Reading
By - News 08 Feb 2005
- News 07 Feb 2005
-
News
17 Jan 2005
Computer Weekly barred from briefing on national programme
The first media demonstration of new multibillion-pound NHS IT systems took place in Whitehall last week - but technology... Continue Reading
By -
News
26 Oct 2004
Clear double advantage
ClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and... Continue Reading
-
News
09 Feb 2004
More questions and answers from SAN School lesson # 5
Here are additional questions and answers from SAN School Lesson 5: Designing a SAN. The questions cover topics ranging from how to determine an effective SAN design to meet your needs, to the differences between fabric switches and loop switches. Continue Reading
By- SearchStorage.com editors
- News 15 Jan 2004
-
Feature
25 Jul 2003
IT directors foresee technology revolution continuing in comms
There are those who hold that the IT revolution has petered out with no more breakthroughs to come. But IT directors attending... Continue Reading
-
News
14 Nov 2002
Chinook parents set to appeal to Europe
The parents of the two Chinook helicopter pilots labelled guilty of gross negligence over the Mull of Kintyre disaster are... Continue Reading
By- Parliamentary reporter
-
News
31 Oct 2002
Government blocks judicial review of Chinook disaster
The Government has made it impossible for the families of two pilots blamed for the crash of Chinook helicopter ZD576 to seek a... Continue Reading
By -
News
24 Jul 2002
MoD refuses to concede error in Chinook verdict
The Ministry of Defence (MoD), citing a new series of simulations by Boeing, has refused to clear the names of two pilots blamed... Continue Reading
By -
News
28 Mar 2002
Minister slams Chinook campaign in debate
In the week when he sent 1,700 troops to Afghanistan, defence secretary Geoff Hoon issued a blistering criticism of Computer... Continue Reading
-
News
14 Feb 2002
Lords Chinook challenge
The Government expects to have a debate in the House of Lords on last week's select committee report on the fatal crash of... Continue Reading
By -
News
15 Nov 2001
Boeing simulation ignored Chinook's Fadec system
A House of Lords committee investigating the crash of Chinook ZD576 on the Mull of Kintyre has found that a Boeing simulation of... Continue Reading
By -
News
18 Oct 2001
Chinook pilots may have been unable to slow down, squadron leader tells Lords
The pilots of Chinook ZD576, which crashed in Scotland in 1994, may have been unable to slow down as they approached the Mull of... Continue Reading
By -
Feature
11 Oct 2001
What's in a name?
As soon as you hear an analyst, consultant, academic or supplier pontificating to an audience of Brits about CIOs, you know... Continue Reading
By