News
Data centre hardware
-
March 26, 2007
26
Mar'07
What is the impact of unstructured data on backup and restore and disaster recovery in general?
As data volumes grow, there's a bigger problem meeting recovery time objectives. We depend on our data, and we have set recovery times for our systems that are zero (no downtime) in some cases, though most companies set recovery times from eight to ...
-
March 22, 2007
22
Mar'07
Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.
-
March 22, 2007
22
Mar'07
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products.
-
February 20, 2007
20
Feb'07
Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.
-
February 14, 2007
14
Feb'07
New attack technique threatens broadband users
Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming
-
February 06, 2007
06
Feb'07
Attackers hit computers that manage Internet traffic
Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage.
-
January 29, 2007
29
Jan'07
Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.
-
January 25, 2007
25
Jan'07
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.
-
January 25, 2007
25
Jan'07
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.
-
January 22, 2007
22
Jan'07
MP slams slow payment of tax credit IT compensation
The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of payment, take US company EDS more than 100 years to pay off in full.
-
January 22, 2007
22
Jan'07
EMC and Ibrix elbow out Panasas at Disney Studios
Disney needed a storage overhaul fast after merging with Pixar and making major changes to its upcoming new movie.
-
January 18, 2007
18
Jan'07
ID theft victim to TJX customers: Mind your data
Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary.
-
January 17, 2007
17
Jan'07
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.
-
January 08, 2007
08
Jan'07
What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?
InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols...
-
January 07, 2007
07
Jan'07
Bug Briefs: OpenOffice vulnerable to attack
Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server.
-
January 07, 2007
07
Jan'07
Brocade buys Silverback for 10 GigE acceleration chips
Adding another string to its bow, Brocade scoops up IP chip acceleration supplier Silverback Systems for an undisclosed sum.
-
December 12, 2006
12
Dec'06
Mixing SAS and SATA disk drives can cause problems
Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds.
-
November 30, 2006
30
Nov'06
Symantec blames piracy for Veritas licensing snafu
Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect.
-
November 28, 2006
28
Nov'06
Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.
-
November 12, 2006
12
Nov'06
Wireless device flaw discovered
A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs.
-
November 07, 2006
07
Nov'06
VMware backup still tough
VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.
-
October 31, 2006
31
Oct'06
Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 6
What storage managers are buying and why
-
October 04, 2006
04
Oct'06
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage, page 2
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 12, 2006
12
Sep'06
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.
-
September 05, 2006
05
Sep'06
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.
-
September 05, 2006
05
Sep'06
Proofpoint delivers strong messaging security
Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.
-
August 24, 2006
24
Aug'06
What do tiered storage and ILM have to do with disaster recovery?
That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our ...
-
August 17, 2006
17
Aug'06
Apple fixes Xsan security flaw
Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.
-
August 01, 2006
01
Aug'06
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.
-
July 30, 2006
30
Jul'06
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks.
-
July 16, 2006
16
Jul'06
Automated provisioning quiz
Take this five-question quiz to see how much you've learned about automated provisioning.
-
July 13, 2006
13
Jul'06
Security Bytes: Investigators slam VA over data breach
Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports.
-
May 23, 2006
23
May'06
Sleep out to help homeless children
The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords.
-
April 21, 2006
21
Apr'06
Battery fault prompts HP laptops recall
Hewlett-Packard is to recall more than 15,000 laptops worldwide because a fault makes them a fire hazard.
-
November 20, 2005
20
Nov'05
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.
-
October 03, 2005
03
Oct'05
How to break into a computer that is right at your fingertips
Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer.
-
September 29, 2005
29
Sep'05
Find out how to bridge the communications gap
Communications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500).
-
September 19, 2005
19
Sep'05
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day.
-
September 11, 2005
11
Sep'05
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.
-
September 05, 2005
05
Sep'05
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.
-
August 06, 2005
06
Aug'05
Trusted Computing Group releases server specs
The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches.
-
July 12, 2005
12
Jul'05
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.
-
May 09, 2005
09
May'05
Computer Weekly wins top honour
ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for...
-
March 21, 2005
21
Mar'05
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well.
-
February 25, 2005
25
Feb'05
Intel offers 64-bit desktop processors
Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid...
-
February 14, 2005
14
Feb'05
Strategic Storage: DR planning blueprint
Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan ...
-
February 08, 2005
08
Feb'05
Loop switch
Loop switch
-
February 07, 2005
07
Feb'05
SATA drives product roundup
<------No summary found------->