News
News Archive
-
October 01, 2007
01
Oct'07
Developing good troubleshooting technique -- from 'Network troubleshooting and diagnostics'
The most important part of troubleshooting is technique. This excerpt examines several approaches such as Bottom-Up, Top-Down, and Divide-and-Conquer methods
-
October 01, 2007
01
Oct'07
3Com to be acquired by equity firm
3Com has announced it will be acquired by private equity firm Bain Capital Partners for US$2.2 billion.
-
October 01, 2007
01
Oct'07
UK will lead £13m study on electronic ID
The UK is to spearhead a £13m pilot project covering 13 European countries to test the interoperability of several electronic identity verification systems. This may eventually give citizens and businesses access to e-government services across the ...
-
October 01, 2007
01
Oct'07
Storage Basics Part 1: What is Fibre Channel?
In the first part of a four-day feature, we explain basic storage technologies. Today: Fibre Channel.
-
September 27, 2007
27
Sep'07
Pacific Hydro finds UTM improves its environment
Renewable energy company Pacific Hydro has found Watchguard's unified threat management devices make a valuable contribution to its defence in depth strategy.
-
September 26, 2007
26
Sep'07
Presence capabilities open university help desk
Presence capabilities have helped one university ensure that calls into its help desk reach the person with the right set of skills.
-
September 26, 2007
26
Sep'07
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review.
-
September 25, 2007
25
Sep'07
How to purchase a data encryption product
Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products.
-
September 25, 2007
25
Sep'07
Archive integration woes dog healthcare providers
Healthcare providers are getting up to speed with networked storage, but say integration of new storage systems with medical applications is still rocky.
-
September 25, 2007
25
Sep'07
ITIL v3 Service Operation: FAQs on Book 4
ITIL expert David Pultorak answers common questions about the new ITIL Service Strategy Core Practice Book 1.
-
September 24, 2007
24
Sep'07
Microsoft's OCS changing the face of VoIP?
Microsoft's OCS platform debuts soon, but will it bring about an industry shift to embedded communication applications as promised?
-
September 24, 2007
24
Sep'07
Stock exchanges face IT challenge to prove ‘best execution’ under Mifid
In less than two months Europe's stock exchange technology will be put to the test when the Markets in Financial Instruments Directive (Mifid) brings new requirements for investment firms, including banks, insurers and hedge funds, to protect ...
-
September 24, 2007
24
Sep'07
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation.
-
September 20, 2007
20
Sep'07
Australians more tech-aware
Telecommunications and the internet are becoming increasingly embedded in the lives of Australians, says an ACMA survey.
-
September 20, 2007
20
Sep'07
NetScout acquires Network General
NetScout will acquire Network General, creating a one-stop shop for network management and monitoring tools.
-
September 20, 2007
20
Sep'07
Unified communications an 'uphill battle' for Microsoft
Unified communications is going to be a tough sell for Microsoft, which is looking to eliminate the PBX and go all software.
-
September 20, 2007
20
Sep'07
Wireless troubleshooting
Wireless network troubleshooting basics are discussed in this guide.
-
September 19, 2007
19
Sep'07
End-to-end network management enables reliable VoIP, unified communications
Monitoring voice quality, service availability, and security conditions are discussed in this Q & A with Gurmeet Lamba of Clarus Systems.
-
September 19, 2007
19
Sep'07
802.11 protocols
802.11 wireless protocols and deployment basics are discussed in this guide.
-
September 18, 2007
18
Sep'07
Cisco to acquire Cognio
Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility.
-
September 18, 2007
18
Sep'07
Nokia to acquire mobile advertiser
Nokia has announced it has entered into an agreement to acquire mobile advertising and marketing company Enpocket for an undisclosed amount.
-
September 18, 2007
18
Sep'07
Wireless security
Wireless security and polices are covered in this guide.
-
September 17, 2007
17
Sep'07
Wireless network deployment and management
Wireless network deployment and management are discussed in this guide.
-
September 17, 2007
17
Sep'07
Wireless access points
The basics of wireless access point (AP) as well as configuration and placement are covered in this guide.
-
September 16, 2007
16
Sep'07
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments.
-
September 16, 2007
16
Sep'07
Storage Decisions Session Downloads: Data Protection and Backup Track (NYC 2007)
Making the backup process seamless and reliable is critical. This track covers the staple backup technologies such as disk and tape, but also has an eye on the litany of new technologies set to drastically alter the data protection landscape. ...
-
September 16, 2007
16
Sep'07
Communications-as-a-service taking hold
Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system.
-
September 16, 2007
16
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out.
-
September 16, 2007
16
Sep'07
Wireless protocols learning guide
Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide.
-
September 16, 2007
16
Sep'07
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager Express.
-
September 10, 2007
10
Sep'07
Product Roundup: E-discovery
A look at some of the suppliers and products that make up the e-discovery market.
-
September 09, 2007
09
Sep'07
VoIP, unified communications prompt new technologies, threats
Wireless voice servers and handsets, VoIP and unified communications threats, and licensing agreements constitute recent changes in the VoIP market.
-
September 09, 2007
09
Sep'07
NetApp, HDS tout scaled-down disk arrays
New offerings are meant to take advantage of storage growth in the midmarket, but experts say the products will still probably appeal most to existing high-end users.
-
September 09, 2007
09
Sep'07
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage.
-
September 07, 2007
07
Sep'07
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix.
-
September 07, 2007
07
Sep'07
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned.
-
September 07, 2007
07
Sep'07
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan.
-
September 06, 2007
06
Sep'07
Learn all about SATA
This handbook offers three related SATA tips which compare SATA to SAS and SCSI and provides advice on striking the right balance between them.
-
September 06, 2007
06
Sep'07
IDC: High-end storage stalls in second quarter
IDC reports a lull in high-end enterprise spending in its quarterly disk tracker, with new growth lower in the market; Seagate plans encrypted 1 TB disk drive for PCs.
-
September 06, 2007
06
Sep'07
Citrix adds Web security with acquisition
Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing.
-
September 06, 2007
06
Sep'07
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months.
-
September 05, 2007
05
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.
-
September 05, 2007
05
Sep'07
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes.
-
September 05, 2007
05
Sep'07
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system.
-
September 04, 2007
04
Sep'07
IT cheat sheets for all
They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz.
-
September 04, 2007
04
Sep'07
NetApp files suit against Sun over ZFS
NetApp says Sun's ZFS violates its patents and seeks an injunction against its distribution, potentially putting Sun's storage business at risk. Update 9/6/07: Sun counterattacks.
-
September 04, 2007
04
Sep'07
Cisco goes next generation with 802.11n
Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access.
-
September 02, 2007
02
Sep'07
Wireless network security: Controlling secondary connections
Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured.
-
September 02, 2007
02
Sep'07
Now the dust has settled on pornography filtering...
Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans.
-
August 31, 2007
31
Aug'07
Cisco issues CallManager security update
Security flaws in Cisco CallManager and Unified Communications Manager could be exploited for cross-site scripting and SQL injection attacks, but a security update is available.