News
News Archive
-
August 17, 2007
17
Aug'07
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity.
-
August 17, 2007
17
Aug'07
Compliance, data breaches heighten database security needs
Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements.
-
August 16, 2007
16
Aug'07
Voice over IPv6: Architectures for Next Generation VoIP Networks
VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those ...
-
August 16, 2007
16
Aug'07
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.
-
August 15, 2007
15
Aug'07
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs.
-
August 15, 2007
15
Aug'07
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS.
-
August 14, 2007
14
Aug'07
QoS -- What voice managers need to know
Quality of Service (QoS) technologies can be quite confusing between technical complexities and marketing jargon. In this tip, find out what voice managers need to know about QoS as it relates to VoIP.
-
August 14, 2007
14
Aug'07
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite.
-
August 14, 2007
14
Aug'07
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.
-
August 14, 2007
14
Aug'07
Telstra network build spurs new security plan
Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy.
-
August 13, 2007
13
Aug'07
Data backup copies overview
How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity.
-
August 13, 2007
13
Aug'07
EMC cashes in with VMware IPO
EMC officially spins off part of its server virtualization subsidiary to the tune of $1.1B. Analysts are hoping the windfall will lead to deeper storage partnerships.
-
August 13, 2007
13
Aug'07
Fibre-optic networks: Access network design
Fibre-optic technology in access networks is expanding due to the demand for broadband. Learn about FTTX and passive optical networking (PON) systems.
-
August 13, 2007
13
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 13, 2007
13
Aug'07
Gartner security summit outlines 'Security 3.0'
Gartner has opened its Sydney Security Summit with a definition of Security 3.0.
-
August 12, 2007
12
Aug'07
Implementing video on demand
Video on demand (VoD), in at least some of its potential service models, is perhaps the most challenging of all network applications. Implementation of VoD should be should be undertaken in three particular steps.
-
August 12, 2007
12
Aug'07
IPv6 from 'CCNA Portable Command Guide', Chapter 25
IPv6, 'CCNA Portable Command Guide,' Chapter 25, explains IPv6 address assignment, static routes in IPv6, IPv6 ping, IPv6 tunnels and RIPng. Learn all you need to know to pass the IPv6 questions on your Cisco Certified Network Associate exam.
-
August 10, 2007
10
Aug'07
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200.
-
August 09, 2007
09
Aug'07
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide.
-
August 09, 2007
09
Aug'07
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...
-
August 09, 2007
09
Aug'07
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...
-
August 09, 2007
09
Aug'07
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.
-
August 09, 2007
09
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 09, 2007
09
Aug'07
IT pros impede PCI, Sarbanes Oxley compliance
The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey.
-
August 09, 2007
09
Aug'07
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.
-
August 09, 2007
09
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 09, 2007
09
Aug'07
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.
-
August 09, 2007
09
Aug'07
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ...
-
August 08, 2007
08
Aug'07
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...
-
August 08, 2007
08
Aug'07
NAS management software specifications
Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...
-
August 08, 2007
08
Aug'07
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.
-
August 08, 2007
08
Aug'07
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.
-
August 08, 2007
08
Aug'07
EMC's RSA to acquire Tablus for data loss prevention
RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software.
-
August 08, 2007
08
Aug'07
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features.
-
August 08, 2007
08
Aug'07
Mozilla to extend security in major Firefox update
The next version of Firefox will include new anti-phishing and anti-malware capabilities. Mozilla also plans to release a pair of fuzzing tools to detect Java, FTP and HTTP flaws.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
IP address depletion hastens IPv6 adoption
IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how much work network operators will face.
-
August 08, 2007
08
Aug'07
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.
-
August 08, 2007
08
Aug'07
NAS gateway specifications
A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...
-
August 08, 2007
08
Aug'07
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features
-
August 08, 2007
08
Aug'07
NAS gateway purchase considerations
NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...
-
August 07, 2007
07
Aug'07
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is ...
-
August 07, 2007
07
Aug'07
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line.
-
August 06, 2007
06
Aug'07
Video networks: The fundamental structure
Video delivery, content network, IPTV, triple play -- these are just a few of the terms used today for video over broadband data networks. This concept of video networks is an increasing challenge, and like most network challenges, this one is ...
-
August 06, 2007
06
Aug'07
NetApp revenues fall $61M short of forecast
NetApp announces that its revenues are down 15% from last quarter, blaming a continued decline in data storage spending.
-
August 06, 2007
06
Aug'07
Researchers wrangle petabytes of data storage with NAS, tape
Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff.
-
August 06, 2007
06
Aug'07
F5 buys Acopia for US$210M
F5 joins the storage market with the acquisition of file virtualisation switch company Acopia.
-
August 05, 2007
05
Aug'07
Windows Vista, IPv6 lead to network performance problems
Windows Vista, which runs on parallel IPv6 and IPv4 protocol stacks, can create network performance problems when used with older routers.
-
August 05, 2007
05
Aug'07
Understanding IMS (IP Multimedia Subsystem)
IMS (IP Multimedia Subsystem) is an emerging architectural framework, based on SIP and IP, for offering multimedia and VoIP services, as well as fixed mobile convergence. This tip explains exactly what the architecture behind IMS.
-
August 03, 2007
03
Aug'07
Discovery of malware cesspool triggers attack fears
Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack.