News
News Archive
-
August 09, 2007
09
Aug'07
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide.
-
August 09, 2007
09
Aug'07
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...
-
August 09, 2007
09
Aug'07
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...
-
August 09, 2007
09
Aug'07
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.
-
August 09, 2007
09
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 09, 2007
09
Aug'07
IT pros impede PCI, Sarbanes Oxley compliance
The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.
-
August 09, 2007
09
Aug'07
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.
-
August 09, 2007
09
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 09, 2007
09
Aug'07
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.
-
August 09, 2007
09
Aug'07
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...
-
August 08, 2007
08
Aug'07
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...
-
August 08, 2007
08
Aug'07
NAS management software specifications
Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...
-
August 08, 2007
08
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 08, 2007
08
Aug'07
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.
-
August 08, 2007
08
Aug'07
EMC's RSA to acquire Tablus for data loss prevention
RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software.
-
August 08, 2007
08
Aug'07
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features.
-
August 08, 2007
08
Aug'07
Mozilla to extend security in major Firefox update
The next version of Firefox will include new anti-phishing and anti-malware capabilities. Mozilla also plans to release a pair of fuzzing tools to detect Java, FTP and HTTP flaws.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
IP address depletion hastens IPv6 adoption
IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how much work network operators will face.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
NAS gateway specifications
A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...
-
August 08, 2007
08
Aug'07
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features
-
August 08, 2007
08
Aug'07
NAS gateway purchase considerations
NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...
-
August 07, 2007
07
Aug'07
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is ...
-
August 07, 2007
07
Aug'07
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line.
-
August 06, 2007
06
Aug'07
Video networks: The fundamental structure
Video delivery, content network, IPTV, triple play -- these are just a few of the terms used today for video over broadband data networks. This concept of video networks is an increasing challenge, and like most network challenges, this one is ...
-
August 06, 2007
06
Aug'07
NetApp revenues fall $61M short of forecast
NetApp announces that its revenues are down 15% from last quarter, blaming a continued decline in data storage spending.
-
August 06, 2007
06
Aug'07
Researchers wrangle petabytes of data storage with NAS, tape
Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff.
-
August 06, 2007
06
Aug'07
F5 buys Acopia for US$210M
F5 joins the storage market with the acquisition of file virtualisation switch company Acopia.
-
August 05, 2007
05
Aug'07
Windows Vista, IPv6 lead to network performance problems
Windows Vista, which runs on parallel IPv6 and IPv4 protocol stacks, can create network performance problems when used with older routers.
-
August 05, 2007
05
Aug'07
Understanding IMS (IP Multimedia Subsystem)
IMS (IP Multimedia Subsystem) is an emerging architectural framework, based on SIP and IP, for offering multimedia and VoIP services, as well as fixed mobile convergence. This tip explains exactly what the architecture behind IMS.
-
August 03, 2007
03
Aug'07
Discovery of malware cesspool triggers attack fears
Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack.
-
August 02, 2007
02
Aug'07
Users stand by NetApp -- For now
Users say their view of NetApp and its products hasn't been affected by news of a revenue shortfall, but some say the clock is ticking on new product features they'd like to see.
-
August 02, 2007
02
Aug'07
Apple releases fixes for Mac OS X, iPhone vulnerabilities
Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone.
-
August 02, 2007
02
Aug'07
VMware helps SRM make a comeback
Symantec's CommandCentral version 5.0 adds support for VMware, which experts say will breathe new life into a fading corner of the storage market.
-
August 02, 2007
02
Aug'07
Security exec Moritz leaving CA
Ron Moritz will depart after five years as CA's chief security strategist. It's the latest in a string of issues that have called the company's strategy into question.
-
August 02, 2007
02
Aug'07
Cisco network design certification gets update
Cisco has updated its professional network design certification, CCDP, to account for new levels of intelligence embedded in a service-oriented architecture.
-
August 02, 2007
02
Aug'07
Cisco network design certification gets update
Cisco has updated its professional network design certification, CCDP, to account for new levels of intelligence embedded in a service-oriented architecture.
-
August 01, 2007
01
Aug'07
Black Hat 2007: Vista users urged to beware of IPv6
A researcher warns that attackers could make trouble for Vista users by exploiting Teredo, an IPv6 tunneling tool enabled by default in the latest Windows OS.
-
August 01, 2007
01
Aug'07
Black Hat 2007: VoIP security reaches tipping point
VoIP security is as bad today as it was a couple years ago, industry experts say. But PGP creator Phil Zimmermann thinks his new Zfone software will help turn the tide.
-
August 01, 2007
01
Aug'07
Networking certification how-to
These networking certification steps focus on what materials you need, what practice tests are best, and what kind of schedule you should put in place in order to pass your exam and certify. If you are a nervous test-taker, these steps also cover ...
-
August 01, 2007
01
Aug'07
Cisco knocks out Avaya as IP PBX heavyweight
IP PBX adoption is rising as Cisco and Avaya square off for market dominance.
-
August 01, 2007
01
Aug'07
Users make iSCSI Sans with USB keys
Users say that Open-E's iSCSI San software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products.
-
August 01, 2007
01
Aug'07
Black Hat 2007 preview: Blue Pill under scrutiny
Among the highlights at the year's most anticipated hacker event, vulnerability researchers will challenge Joanna Rutkowska's Blue Pill concept. They'll also pick apart flaws in VoIP, NAC and Web applications.
-
August 01, 2007
01
Aug'07
Mozilla fixes two critical Firefox flaws
Firefox version 2.0.0.6 addresses critical flaws involving unescaped URLs passing to external programs and privilege escalation.
-
August 01, 2007
01
Aug'07
Black Hat 2007: Researchers highlight new database attack method
At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers.
-
July 31, 2007
31
Jul'07
Attackers ultimately drive security market, analyst says
The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal sensitive information.
-
July 31, 2007
31
Jul'07
Security update fixes Yahoo Widgets flaw
Attackers could exploit a Yahoo Widgets flaw to run malicious code on compromised Windows computers, but a security update is available.
-
July 31, 2007
31
Jul'07
Fixed-content data archiving products get a boost
Caringo, EMC and HDS spruce up their fixed-content data archiving products as buzz around compliance and legal discovery continues.
-
July 31, 2007
31
Jul'07
Cisco knocks out Avaya as IP PBX heavyweight
IP PBX adoption is rising as Cisco and Avaya square off for market dominance.