Innovation Reigns at Wireless Expo
This year’s Unwired Innovation Expo (UIE) in Clovis, New Mexico was simply amazing. By now, we’re all a bit desensitized to the wonder of wireless technology, and easily forget that under the hood of our WLAN environments lives some impressive core technology. It takes an event like the UIE to really remind us of just how empowering the wireless industry is to innovative products, and the minor miracles that are possible when our wireless engine is running right. Here’s a look
Seagate's HAMR Time: Can't Touch This...Yet!
Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That's double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006.
Data Classification Tips & Technologies Part 2
Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well.
Do We Need World Backup Day?
March 31 is World Backup Day. Do we really need a day devoted to something that we should be doing every day? If we do, we should have a World Test Recovery Day, too.
Boundary Hosts Network Monitoring Service
Real-time network monitoring is quickly becoming a must have capability for network managers supporting transaction intensive networks, especially when cloud based applications are involved.
The BYOD Security Dilemma
The Information Security Forum this week released a report titled 'Threat Horizon 2014' that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at 'Internal Threats', which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an o
5 Secure Switch Management Best Practices
One of the easiest things an organization can do to help increase the security posture of their infrastructure is to implement a policy and standard for secure management. Often overlooked, or not fully executed, this is what I consider to be the low hanging fruit of network security.
Data Classification Tips And Technologies
As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountab
How To Set Up A Certificate Authority In 10 Minutes
Having a company owned certificate authority makes managing your network devices simpler and more secure. There is nothing inherently wrong with self-signed certs, but you can do better. You can build a CA issue your first certificate in about 10 minutes. Here is how to do it.
Equinix, Tier 3 Tackle Public Cloud Worries
An infrastructure-as-a-service (IaaS) provider, Tier 3, is partnering with data center services provider Equinix to enable enterprises to run a private cloud computing environment on a public cloud service. The idea is to help customers take advantage of the cost efficiency and flexibility offered by public cloud computing, while protecting them from worries about multitenancy and security that give so many enterprises pause.
Saving The SAN
You don't have to turn your storage area network upside down, with performance-sensitive data moved into the server on a flash-memory device. If you can fix its performance issues, the SAN has distinct advantages over server-side caching.
Data Caps And Treating Employees Like Adults
Carriers like AT&T and Verizon Wireless are using data caps to manage the explosive growth in 3G/4G data consumption. Hey, kids--the 1990s called and wants its bandwidth management strategy back. As Lee Badman points out in "4G? No, It's More Like 4Gee!" the data rates available to wireless consumers are growing rapidly and our demand is keeping pace. When you have high demand and data caps, the chance of overages is very likely, and the last thing anyone wants is out-of-control telecom costs. C
HP-Polycom Partnership May Boost Lync Adoption
HP and Polycom are taking their partnership to a new level, combining HP’s networking technology and Polycom’s videoconferencing products to deliver Microsoft’s Lync unified communications platform to the enterprise. An HP representative says that while many Lync licenses have been sold by Microsoft, several of those deployments are on hold because of the complexity of integrating the three elements--complexity that the two partners aim to address.
Synchronizing Custom Dictionaries With The Cloud
Everyone I know who writes about technology has developed an extensive custom dictionary file for Microsoft Office. Sometimes it seems every third word I write is a company, product name or some piece of tech jargon that Word doesn't recognize. Since I work on several different computers, I use SugarSync to keep my custom dictionary up to date.
Zero to Private Cloud in 8 Steps
Here are eight steps for going from zero to private cloud. Note that I didn’t say eight "easy" steps. But don’t let that bother you--nothing that’s easy is ever worth doing anyway.
Arista Outpaces Cisco Again With FPGA Switch
Applications and initiatives like private cloud computing, virtualization and mobility are placing increasing pressure on network infrastructure to be faster and more capable. Initiatives like software-defined networking and protocols such as OpenFlow can make the network more flexible and manageable, but they don’t really solve the problem of application performance where high-speed, low-latency requirements are the rule. Only by removing hops and their attendant latency from the network
Is Your Network Ready For Romley?
Server manufacturers have been quick to roll out new models designed to run on Intel’s new Xeon E5 family of processors, a.k.a. Romley, which touts an 80% performance improvement over earlier Xeon versions. As surely as the knee bone’s connected to the thigh bone, a boost in server performance is going to demand a bigger network pipeline. Networking vendors and other industry experts think the introduction of Romley is going to be a significant catalyst for adoption of 10-Gigabit Eth
4G? No, It’s More Like 4Gee!
Have you actually held a 4G device in your hands while it does a speed test? Has your brain struggled to reconcile the numbers displayed at the end of the test with the fact that you’re connected to a mobile network and not Wi-Fi? Have you felt your reality get pleasantly rocked in a way that left you a bit confounded over the numbers that your device was showing you? This 4G stuff is simply amazing.
Compliance Issues Top 2012 Healthcare IT Agenda
What could be worse for IT departments than grappling with the issues related to Y2K? Ask a U.S. healthcare provider within the context of its top IT priorities for 2012 and the response may be government-mandated compliance.
The Upside-Down SAN
Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground.
Piston Delivers Private Cloud In Hours
IT departments looking to put up private cloud environments in a hurry, and without some of the complexity usually associated with cloud infrastructure, would do well to take a look at Piston Cloud from Piston Cloud Computing.
Security Professionals Get The Best Toys
Do you think penetration testers--the people that companies hire to break into organizations and test their defenses--remain immersed in the pale glow of a stack of monitors listening to techno and mainlining over-caffeinated fruit drinks? I was visiting Steve Stasikounis, CEO of Secure Network Technologies and Dark Reading contributor, last week in his offices, and he couldn't help showing off his latest penetration testing and forensic investigation tools.
Flat Network Strength Also A Security Weakness
Security is one of the biggest concerns and challenges for today’s interconnected systems, regardless of the network type deployed. However, the intricacies of flat networks bring new nuances to best security practices, which can be addressed by combining common sense with some industry-leading strategies.
Smart Taps Getting Smarter
Today’s networks are awash in traffic, making it difficult for administrators to find what is pertinent when diagnosing network packets for security issues and performance. Those harried administrators can turn to the latest smart taps to ease their packet gathering chores.
Quantum Dedupes Data Before It Hits The Cloud
Quantum, a provider of data protection and big data management, has announced a software platform to help customers take advantage of cloud-based data protection, using its vmPro technology and newly launched virtual deduplication appliance, DXi V1000. The company has also partnered with Xerox, which will use its underlying technology for its cloud backup and disaster recovery services.
WWPass: Only The Just May Pass the Authentication Test
Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.