News

News Archive

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 24, 2006 24 Sep'06

    Apple fixes Mac Wi-Fi flaws

    Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 20, 2006 20 Sep'06

    Reporter's notebook: Hidden gems of Interop

    The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.

  • September 19, 2006 19 Sep'06

    NAC, VPNs and behavior analysis in the Interop spotlight

    Security for the enterprise network was emphasised at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.

  • September 18, 2006 18 Sep'06

    VoIP user experience tested

    Most VoIP monitoring is focused on quality of service, but one new company is taking a different tack and looking at the quality of experience.

  • September 16, 2006 16 Sep'06

    Universities lean on each other for better disaster recovery

    As another school year begins, colleges and universities are opening their doors to each other in order to get enterprise-level disaster recovery plans working.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 2

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 3

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Mozilla fixes several Firefox flaws

    Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems.

  • September 14, 2006 14 Sep'06

    Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...

  • September 14, 2006 14 Sep'06

    Calling network management vendors: It's time to get on board with VoIP

    Despite the hype, full-scale VoIP deployments are hard to find. According to our research at Yankee Group, over 80% of U.S. enterprises have VoIP deployed somewhere in their organization in some shape or form. This includes departmental trials and ...