News

News Archive

  • October 09, 2006 09 Oct'06

    Symantec unveils Security 2.0 initiative

    As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft.

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • October 04, 2006 04 Oct'06

    ISCSI gains strength from servers

    More powerful servers are helping ease some performance concerns for users considering IP SANs, but others say they still want to see more improvement.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • October 03, 2006 03 Oct'06

    3Com rolls out unified SMB switch

    3Com hit the market today with an all-in-one unified switch for SMBs.

  • October 03, 2006 03 Oct'06

    Alliance and Leicester to overhaul core systems

    Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • October 02, 2006 02 Oct'06

    Cisco brings video to the enterprise

    With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.

  • October 02, 2006 02 Oct'06

    Cisco brings video to the enterprise

    With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.

  • October 01, 2006 01 Oct'06

    Column: The myths and realities of VoIP security

    Security is often cited as one of the primary reasons organizations have not deployed VoIP. The biggest VoIP security threat is not making headlines. Zeus Kerravala, Yankee Group analyst, cuts through the hype so network managers can maximize the ...

  • October 01, 2006 01 Oct'06

    New exploits target Microsoft's PowerPoint, IE

    Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.

  • September 28, 2006 28 Sep'06

    Top tech tips from SearchStorage.com

    Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.

  • September 27, 2006 27 Sep'06

    Users say keeping it simple means keeping one vendor

    Despite some potential benefits of heterogeneous shops, users at Storage Decisions say they find sticking with one vendor a better way to survive the storage sprawl.

  • September 26, 2006 26 Sep'06

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

  • September 26, 2006 26 Sep'06

    Stration worm targets Windows machines

    The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.

  • September 26, 2006 26 Sep'06

    Burton Group: Web application firewall market maturing

    Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.

  • September 25, 2006 25 Sep'06

    Open source router on par with Cisco, users say

    To avoid paying top dollar for Cisco routers, two users say Vyatta's Open Flexible Router is a viable alternative to the proprietary norm, with pluses and minuses, of course.

  • September 25, 2006 25 Sep'06

    ISCSI gets a boost from InfiniBand

    The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI storage.

  • September 25, 2006 25 Sep'06

    IP telephony unites New Orleans nonprofit after Katrina

    Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution

  • September 25, 2006 25 Sep'06

    IT pros worried about unsecured devices

    IT admins keep working to make networks secure even as more unsecured personal gadgets their way into companies.

  • September 24, 2006 24 Sep'06

    Hijacked consumer machines target the enterprise

    Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 24, 2006 24 Sep'06

    Apple fixes Mac Wi-Fi flaws

    Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 20, 2006 20 Sep'06

    Reporter's notebook: Hidden gems of Interop

    The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.

  • September 19, 2006 19 Sep'06

    NAC, VPNs and behavior analysis in the Interop spotlight

    Security for the enterprise network was emphasised at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.

  • September 18, 2006 18 Sep'06

    VoIP user experience tested

    Most VoIP monitoring is focused on quality of service, but one new company is taking a different tack and looking at the quality of experience.

  • September 16, 2006 16 Sep'06

    Universities lean on each other for better disaster recovery

    As another school year begins, colleges and universities are opening their doors to each other in order to get enterprise-level disaster recovery plans working.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 2

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 3

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Mozilla fixes several Firefox flaws

    Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems.

  • September 14, 2006 14 Sep'06

    Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...

  • September 14, 2006 14 Sep'06

    Calling network management vendors: It's time to get on board with VoIP

    Despite the hype, full-scale VoIP deployments are hard to find. According to our research at Yankee Group, over 80% of U.S. enterprises have VoIP deployed somewhere in their organization in some shape or form. This includes departmental trials and ...

  • September 12, 2006 12 Sep'06

    Dell and EMC: Five more years

    Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

  • September 12, 2006 12 Sep'06

    Big security fixes for QuickTime, Flash Player

    Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.

  • September 12, 2006 12 Sep'06

    Is there a generic blueprint for an IP-based call center?

    Is there a generic blueprint for an IP-based call center? Where could I find one?

  • September 12, 2006 12 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 11, 2006 11 Sep'06

    VoIP still a confusing area for SMBs

    A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology.

  • September 11, 2006 11 Sep'06

    Data storage compliance's impact on storage product choices

    Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there ...

  • September 11, 2006 11 Sep'06

    Security Bytes: Hackers target the Terminator

    In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.