News

Data centre hardware

  • February 14, 2007 14 Feb'07

    New attack technique threatens broadband users

    Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming

  • February 06, 2007 06 Feb'07

    Attackers hit computers that manage Internet traffic

    Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage.

  • January 29, 2007 29 Jan'07

    Hybrid drives hit NAS boxes

    DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.

  • January 25, 2007 25 Jan'07

    Apple fixes Mac Wi-Fi flaw

    The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.

  • January 25, 2007 25 Jan'07

    Symantec makes major update to Enterprise Vault

    Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.

  • January 22, 2007 22 Jan'07

    MP slams slow payment of tax credit IT compensation

    The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of payment, take US company EDS more than 100 years to pay off in full.

  • January 22, 2007 22 Jan'07

    EMC and Ibrix elbow out Panasas at Disney Studios

    Disney needed a storage overhaul fast after merging with Pixar and making major changes to its upcoming new movie.

  • January 18, 2007 18 Jan'07

    ID theft victim to TJX customers: Mind your data

    Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary.

  • January 17, 2007 17 Jan'07

    Data breach at TJX could affect millions

    Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.

  • January 08, 2007 08 Jan'07

    What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?

    InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols...

  • January 07, 2007 07 Jan'07

    Bug Briefs: OpenOffice vulnerable to attack

    Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server.

  • January 07, 2007 07 Jan'07

    Brocade buys Silverback for 10 GigE acceleration chips

    Adding another string to its bow, Brocade scoops up IP chip acceleration supplier Silverback Systems for an undisclosed sum.

  • December 12, 2006 12 Dec'06

    Mixing SAS and SATA disk drives can cause problems

    Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds.

  • November 30, 2006 30 Nov'06

    Symantec blames piracy for Veritas licensing snafu

    Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect.

  • November 28, 2006 28 Nov'06

    Adware targets Mac OS X

    As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.

  • November 12, 2006 12 Nov'06

    Wireless device flaw discovered

    A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs.

  • November 07, 2006 07 Nov'06

    VMware backup still tough

    VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 6

    What storage managers are buying and why

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 2

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 12, 2006 12 Sep'06

    Big security fixes for QuickTime, Flash Player

    Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • September 05, 2006 05 Sep'06

    Proofpoint delivers strong messaging security

    Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.

  • August 24, 2006 24 Aug'06

    What do tiered storage and ILM have to do with disaster recovery?

    That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our ...

  • August 17, 2006 17 Aug'06

    Apple fixes Xsan security flaw

    Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.

  • August 01, 2006 01 Aug'06

    Security Bytes: Exploits targeting freshly patched Apple flaw

    Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.

  • July 30, 2006 30 Jul'06

    EqualLogic updates storage provisioning software

    Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks.

  • July 16, 2006 16 Jul'06

    Automated provisioning quiz

    Take this five-question quiz to see how much you've learned about automated provisioning.

  • July 13, 2006 13 Jul'06

    Security Bytes: Investigators slam VA over data breach

    Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports.

  • May 23, 2006 23 May'06

    Sleep out to help homeless children

    The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords.

  • April 21, 2006 21 Apr'06

    Battery fault prompts HP laptops recall

    Hewlett-Packard is to recall more than 15,000 laptops worldwide because a fault makes them a fire hazard.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • October 03, 2005 03 Oct'05

    How to break into a computer that is right at your fingertips

    Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer.

  • September 29, 2005 29 Sep'05

    Find out how to bridge the communications gap

    Communications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500).

  • September 19, 2005 19 Sep'05

    Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day.

  • September 11, 2005 11 Sep'05

    VoIP turns up the heat on firewalls

    New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • August 06, 2005 06 Aug'05

    Trusted Computing Group releases server specs

    The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches.

  • July 12, 2005 12 Jul'05

    Tony Asaro: Blogs and more

    Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.

  • May 09, 2005 09 May'05

    Computer Weekly wins top honour

    ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for...

  • March 21, 2005 21 Mar'05

    Linux lags Windows in new security report

    A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well.

  • February 25, 2005 25 Feb'05

    Intel offers 64-bit desktop processors

    Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid...

  • February 14, 2005 14 Feb'05

    Strategic Storage: DR planning blueprint

    Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan ...

  • February 08, 2005 08 Feb'05

    Loop switch

    Loop switch

  • February 07, 2005 07 Feb'05

    SATA drives product roundup

    <------No summary found------->

CIO
Security
Networking
Data Center
Data Management
Close