News
News Archive
-
September 16, 2006
16
Sep'06
Universities lean on each other for better disaster recovery
As another school year begins, colleges and universities are opening their doors to each other in order to get enterprise-level disaster recovery plans working.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage, page 2
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 14, 2006
14
Sep'06
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage, page 3
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 14, 2006
14
Sep'06
Three ways to create clustered storage
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.
-
September 14, 2006
14
Sep'06
Mozilla fixes several Firefox flaws
Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems.
-
September 14, 2006
14
Sep'06
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...
-
September 14, 2006
14
Sep'06
Calling network management vendors: It's time to get on board with VoIP
Despite the hype, full-scale VoIP deployments are hard to find. According to our research at Yankee Group, over 80% of U.S. enterprises have VoIP deployed somewhere in their organization in some shape or form. This includes departmental trials and ...
-
September 12, 2006
12
Sep'06
Dell and EMC: Five more years
Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.
-
September 12, 2006
12
Sep'06
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.
-
September 12, 2006
12
Sep'06
Is there a generic blueprint for an IP-based call center?
Is there a generic blueprint for an IP-based call center? Where could I find one?
-
September 12, 2006
12
Sep'06
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.
-
September 11, 2006
11
Sep'06
VoIP still a confusing area for SMBs
A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology.
-
September 11, 2006
11
Sep'06
Data storage compliance's impact on storage product choices
Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there ...
-
September 11, 2006
11
Sep'06
Security Bytes: Hackers target the Terminator
In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.
-
September 11, 2006
11
Sep'06
Storage IPOs bode well for competition
Analysts say new public players could breathe competitive life into the market, but it all hinges on how well execs can balance the needs of users and shareholders.
-
September 06, 2006
06
Sep'06
Fast Guide: VoIP encryption
A guide to encryption within VoIP networks
-
September 06, 2006
06
Sep'06
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.
-
September 06, 2006
06
Sep'06
Security Bytes: New flaw in Cisco IOS
Security news including Cisco, Mozilla hires a former Microsoft strategist to bolster security, a new "pump-and-dump" stock spam campaign is discovered and TippingPoint lists info on new flaws.
-
September 06, 2006
06
Sep'06
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.
-
September 05, 2006
05
Sep'06
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.
-
September 05, 2006
05
Sep'06
Proofpoint delivers strong messaging security
Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.
-
September 05, 2006
05
Sep'06
VoIP outsourcing: Save money and gain flexibility
VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.
-
September 05, 2006
05
Sep'06
VoIP outsourcing: Save money and gain flexibility
VoIP outsourcing is the way to go for organizations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.
-
September 05, 2006
05
Sep'06
Cisco accelerates the branch
Cisco rolls WAN optimization, application acceleration and Wide Area File Services (WAFS) in a single branch box to complement its Application Control Engine (ACE) data center optimization product.
-
September 05, 2006
05
Sep'06
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.
-
September 05, 2006
05
Sep'06
Instant messaging boom brings security concerns
Instant messaging (IM) has made significant inroads to the enterprise, but using public IM applications may open up security holes in the network
-
September 05, 2006
05
Sep'06
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.
-
September 04, 2006
04
Sep'06
Revamped Cisco WAFS worth the wait, users say
Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait.
-
September 04, 2006
04
Sep'06
New Microsoft Word zero-day exploit discovered
Trojan.MDropper-Q is exploiting a vulnerability in Microsoft's word-processing application that could allow attackers to take control of certain machines.
-
September 04, 2006
04
Sep'06
Instant messaging boom brings security concerns
Instant messaging (IM) has made significant inroads to the enterprise, but using public IM applications may open up security holes in the network.
-
August 31, 2006
31
Aug'06
Attacks against MS06-040 on the rise
Six pieces of malware are now going after the Windows Server Service flaw outlined in MS06-040, and a spike in attacks has led Symantec to raise its ThreatCon to Level 2.
-
August 31, 2006
31
Aug'06
Emulex acquisition could cloud future of FC-SATA spec
New Emulex subsidiary Sierra Logic's strength is in FC-SATA bridging technology. Meanwhile, ONStor launches midrange clustered NAS, and Quantum shareholders withhold votes.
-
August 31, 2006
31
Aug'06
Interoperability issues for a 6500 Cisco switch and a 3Comm 7700
In this response, Sudhanshu Gupta talks about the interoperability issues that go along with a 6500 Cisco switch and a 3Comm 7700.
-
August 31, 2006
31
Aug'06
Connecting ISDN PRI to a VPN via a Cisco AS5350
Sudhanshu Gupta examines how to connect an ISDN PRI to a VPN using a Cisco AS5350.
-
August 31, 2006
31
Aug'06
Routing phone calls to a POTS
Sudhanshu Gupta explains how to route all phone calls to a POTS, in this Q&A.
-
August 31, 2006
31
Aug'06
Configuring managed and unmanaged switches
In this Q&A, Sudhanshu Gupta answers which cable to use with managed and unmanaged switches.
-
August 30, 2006
30
Aug'06
Survey: Data breaches difficult to spot, prevent
IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches
-
August 30, 2006
30
Aug'06
Symantec CIO vies with virtualization, device policy
Symantec CIO David Thompson says virtualization is a big part of the security giant's future and it has developed a policy to mitigate virtualization security risks.
-
August 30, 2006
30
Aug'06
VoIP outsourcing: Save money while gaining flexibility
VoIP outsourcing is the way to go for firms looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.
-
August 30, 2006
30
Aug'06
Malware database access sparks debate
Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?
-
August 29, 2006
29
Aug'06
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.
-
August 29, 2006
29
Aug'06
An era ends as Tandberg buys Exabyte
The once-dominant player in the tape market has ended a long downward spiral by selling off its assets. At least customers can now count on continued support, analysts say.
-
August 28, 2006
28
Aug'06
Microsoft probes alleged Internet Explorer flaw
A research group claims attackers could launch malicious code using a flaw in the way Internet Explorer instantiates certain COM objects' ActiveX controls.
-
August 28, 2006
28
Aug'06
Virtualisation eases patch management pain
IT managers are learning that using desktop virtualisation software to patch their enterprise desktops has the potential to save time, money and energy.
-
August 28, 2006
28
Aug'06
Riverbed update offers users more bandwidth, better reporting
Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.
-
August 28, 2006
28
Aug'06
ProCurve rolls out three new switch series
ProCurve Networking by HP has added three new series of switches to its lineup.
-
August 27, 2006
27
Aug'06
Third-party patching: Prudent or perilous?
Security patches issued by third parties have become more prevalent in recent months, and while some security pros endorse them, others say they're more trouble than they're worth.
-
August 27, 2006
27
Aug'06
3PAR adds midrange array for secondary sites
3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.
-
August 27, 2006
27
Aug'06
Duplex mismatch
This article helps networking engineers understand the issues behind duplex mismatch, one of the most troublesome problems in today's Ethernet networks. Learn why duplex mismatch occurs and how you can prevent it with autonegotiation and hard coding.