News
IT hardware
-
October 31, 2006
31
Oct'06
E-vaulting's many faces can confuse IT efforts
E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...
-
October 30, 2006
30
Oct'06
Storage vendors polish their wares at SNW
EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.
-
October 30, 2006
30
Oct'06
Storage vendors polish their wares at SNW, page 2
EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.
-
October 26, 2006
26
Oct'06
IT greats: Top 10 greatest IT people
For every world-famous name with a world famous fortune – think Bill Gates, Steve Jobs and Michael Dell – there are hundreds of other individuals who have moved the IT industry and its technology inexorably forward
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 6
What storage managers are buying and why
-
October 23, 2006
23
Oct'06
QLogic dives into directors
QLogic will announce its new SanBox 9000 director this week, but it's missing true director-class features and is encroaching on a market already dominated by Brocade and Cisco.
-
October 09, 2006
09
Oct'06
Isilon adds snapshots, makes play for mainstream NAS
Users and analysts say Isilon's new snapshot features are a challenge to NetApp, but the NAS cluster specialist still has a way to go to compete in the enterprise.
-
October 04, 2006
04
Oct'06
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...
-
September 25, 2006
25
Sep'06
ISCSI gets a boost from InfiniBand
The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI storage.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage, page 2
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 12, 2006
12
Sep'06
Dell and EMC: Five more years
Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.
-
September 12, 2006
12
Sep'06
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.
-
September 05, 2006
05
Sep'06
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.
-
September 05, 2006
05
Sep'06
Proofpoint delivers strong messaging security
Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.
-
August 31, 2006
31
Aug'06
Emulex acquisition could cloud future of FC-SATA spec
New Emulex subsidiary Sierra Logic's strength is in FC-SATA bridging technology. Meanwhile, ONStor launches midrange clustered NAS, and Quantum shareholders withhold votes.
-
August 28, 2006
28
Aug'06
Riverbed update offers users more bandwidth, better reporting
Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.
-
August 27, 2006
27
Aug'06
3PAR adds midrange array for secondary sites
3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.
-
August 24, 2006
24
Aug'06
What do tiered storage and ILM have to do with disaster recovery?
That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our ...
-
August 17, 2006
17
Aug'06
Apple fixes Xsan security flaw
Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.
-
August 03, 2006
03
Aug'06
EMC updates SAN Advisor design tool
EMC's SAN design tool now recognises zones and allows users to customise rules; HP and EMC sign five-year cross-licensing deal.
-
August 01, 2006
01
Aug'06
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.
-
July 30, 2006
30
Jul'06
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks.
-
July 16, 2006
16
Jul'06
Automated provisioning quiz
Take this five-question quiz to see how much you've learned about automated provisioning.
-
July 13, 2006
13
Jul'06
Security Bytes: Investigators slam VA over data breach
Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports.
-
May 23, 2006
23
May'06
Sleep out to help homeless children
The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords.
-
April 21, 2006
21
Apr'06
Battery fault prompts HP laptops recall
Hewlett-Packard is to recall more than 15,000 laptops worldwide because a fault makes them a fire hazard.
-
February 07, 2006
07
Feb'06
Fast Guide: Storage technologies
A guide to storage technologies for both SMBs and enterprise users. This will help you sort out the advantages, limitations and applications of each technology.
-
November 20, 2005
20
Nov'05
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.
-
October 03, 2005
03
Oct'05
How to break into a computer that is right at your fingertips
Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer.
-
September 29, 2005
29
Sep'05
Find out how to bridge the communications gap
Communications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500).
-
September 20, 2005
20
Sep'05
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.
-
September 19, 2005
19
Sep'05
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day.
-
September 11, 2005
11
Sep'05
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.
-
September 05, 2005
05
Sep'05
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.
-
August 29, 2005
29
Aug'05
Storage area network quiz
It's all about the storage area network (SAN) -- man. The more you know, the easier it is. Take our SAN quiz and find out where you stand as a SAN guru.
-
August 06, 2005
06
Aug'05
Trusted Computing Group releases server specs
The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches.
-
July 12, 2005
12
Jul'05
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.
-
May 17, 2005
17
May'05
TNT to provide staff with e-mail smartphones rather than laptops
Logistics company TNT is to provide up to 700 staff worldwide with mobile e-mail, using the Nokia Communicator 9500 smartphone as...
-
May 09, 2005
09
May'05
Computer Weekly wins top honour
ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for...
-
March 21, 2005
21
Mar'05
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well.
-
February 25, 2005
25
Feb'05
Intel offers 64-bit desktop processors
Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid...
-
February 14, 2005
14
Feb'05
Strategic Storage: DR planning blueprint
Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan ...
-
February 08, 2005
08
Feb'05
Loop switch
Loop switch
-
February 07, 2005
07
Feb'05
SATA drives product roundup
<------No summary found------->
-
January 17, 2005
17
Jan'05
'Benevolent' NT4 patches a surprise to some
Microsoft's first security bulletins of the new year included fixes for the now-unsupported Windows NT Server 4.0. On a related note, administrators are cautioned to apply one of January's patches in a specific order to avoid problems.
-
January 17, 2005
17
Jan'05
Computer Weekly barred from briefing on national programme
The first media demonstration of new multibillion-pound NHS IT systems took place in Whitehall last week - but technology...
-
October 26, 2004
26
Oct'04
IBM sharpens blades
IBM has announced new management tools and upgraded models of its HS20 and JS20 blade servers.
-
October 26, 2004
26
Oct'04
Clear double advantage
ClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and...
-
September 27, 2004
27
Sep'04
Fast Guide: iSCSI
If you need to come up to speed rapidly on iSCSI, you've come to the right place. In this Fast Guide, we touch upon the basics and then we walk you through the pros and cons of iSCSI and Fibre Channel.
-
September 27, 2004
27
Sep'04
Five steps to using the Kerberos protocol
This excerpt from "Windows Server 2003 security infrastructures" explains the basic Kerberos protocol as it is defined in RFC 1510.