Expert Analysis
Content posted in March 2012
Page 1 / 4   >   >>
Piston Cloud Demos Enterprise OpenStack Distribution
Piston Cloud Demos Enterprise OpenStack Distribution
Network Computing Videos  |  3/30/2012  | 
OpenStack provides a standard framework for cloud delivery, but it's not a product. Piston Cloud, launched by co-Founder and CEO Joshua McKenty, provides that product, making it easy to configure and deploy a private cloud.
Innovation Reigns at Wireless Expo
Commentary  |  3/30/2012  | 
This year’s Unwired Innovation Expo (UIE) in Clovis, New Mexico was simply amazing. By now, we’re all a bit desensitized to the wonder of wireless technology, and easily forget that under the hood of our WLAN environments lives some impressive core technology. It takes an event like the UIE to really remind us of just how empowering the wireless industry is to innovative products, and the minor miracles that are possible when our wireless engine is running right. Here’s a look
Arista Puts Real-Time Apps On New Switch
Arista Puts Real-Time Apps On New Switch
Network Computing Videos  |  3/30/2012  | 
Arista, already known for its ultra low latency switches, unveiled its AppSwitch 7124FX. Andy Bechtolsheim, the company's founder, and CDOr, and one of the valley's most decorated entrepreneurs explains the importance of this new offering.
Piston Cloud Demos Enterprise OpenStack Distribution
Piston Cloud Demos Enterprise OpenStack Distribution
Network Computing Videos  |  3/30/2012  | 
OpenStack provides a standard framework for cloud delivery, but it's not a product. Piston Cloud, launched by co-Founder and CEO Joshua McKenty, provides that product, making it easy to configure and deploy a private cloud.
Arista Puts Real-Time Apps On New Switch
Arista Puts Real-Time Apps On New Switch
Network Computing Videos  |  3/30/2012  | 
Arista, already known for its ultra low latency switches, unveiled its AppSwitch 7124FX. Andy Bechtolsheim, the company's founder, and CDOr, and one of the valley's most decorated entrepreneurs explains the importance of this new offering.
Seagate's HAMR Time: Can't Touch This...Yet!
News  |  3/30/2012  | 
Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That's double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006.
Data Classification Tips & Technologies Part 2
News  |  3/30/2012  | 
Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well.
Virtualization, Unified Communications Meet, At Last
News  |  3/29/2012  | 
Unified communications servers and virtualization do mix, more enterprises find. But desktop virtualization and UC remains tricky.
Valley View: Private Cloud, Cloud Apps, Cloudy Thoughts
Valley View: Private Cloud, Cloud Apps, Cloudy Thoughts
Network Computing Videos  |  3/29/2012  | 
InformationWeek's Valley View goes in depth with Arista founder Andy Bechtolsheim, Salesforce.com co-Founder Parker Harris, Evernote CEO Phil Libin, and Piston Cloud CEO Joshua McKenty.
Do We Need World Backup Day?
Commentary  |  3/29/2012  | 
March 31 is World Backup Day. Do we really need a day devoted to something that we should be doing every day? If we do, we should have a World Test Recovery Day, too.
Boundary Hosts Network Monitoring Service
News  |  3/29/2012  | 
Real-time network monitoring is quickly becoming a must have capability for network managers supporting transaction intensive networks, especially when cloud based applications are involved.
Avere Systems Launches New NAS Appliance
News  |  3/29/2012  | 
Avere Edge Filer implements a new architecture and global user namespace that gives it management control of all legacy filers and NAS systems.
The BYOD Security Dilemma
News  |  3/29/2012  | 
The Information Security Forum this week released a report titled 'Threat Horizon 2014' that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at 'Internal Threats', which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an o
Blue Jeans Network Undercuts Cisco Video Pricing
News  |  3/28/2012  | 
Cloud videoconferencing provider offers a monthly per-port service. What does it mean for Cisco and Polycom?
5 Secure Switch Management Best Practices
News  |  3/28/2012  | 
One of the easiest things an organization can do to help increase the security posture of their infrastructure is to implement a policy and standard for secure management. Often overlooked, or not fully executed, this is what I consider to be the low hanging fruit of network security.
Data Classification Tips And Technologies
News  |  3/28/2012  | 
As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountab
How To Set Up A Certificate Authority In 10 Minutes
Slideshows  |  3/28/2012  | 
Having a company owned certificate authority makes managing your network devices simpler and more secure. There is nothing inherently wrong with self-signed certs, but you can do better. You can build a CA issue your first certificate in about 10 minutes. Here is how to do it.
Zetta.net Refreshes DataProtect, Its Cloud Backup and Recovery Service
News  |  3/28/2012  | 
DataProtect Version 3.0 is "a complete rewrite and relaunch of the company’s offerings," according to one expert. Find out what's changed in the online backup and data recovery service.
Equinix, Tier 3 Tackle Public Cloud Worries
News  |  3/28/2012  | 
An infrastructure-as-a-service (IaaS) provider, Tier 3, is partnering with data center services provider Equinix to enable enterprises to run a private cloud computing environment on a public cloud service. The idea is to help customers take advantage of the cost efficiency and flexibility offered by public cloud computing, while protecting them from worries about multitenancy and security that give so many enterprises pause.
Why Apple Must Enable FaceTime On LTE
Commentary  |  3/27/2012  | 
Video calling is a sci-fi staple, from Star Trek to The Jetsons. But to bring it mainstream, Apple must allow FaceTime on LTE.
Saving The SAN
Commentary  |  3/27/2012  | 
You don't have to turn your storage area network upside down, with performance-sensitive data moved into the server on a flash-memory device. If you can fix its performance issues, the SAN has distinct advantages over server-side caching.
Google To Counter Facebook's Social Comment System?
News  |  3/27/2012  | 
Third-party websites may get a Google+ commenting system, suggests report from Google conference in Saudi Arabia.
Data Caps And Treating Employees Like Adults
Commentary  |  3/27/2012  | 
Carriers like AT&T and Verizon Wireless are using data caps to manage the explosive growth in 3G/4G data consumption. Hey, kids--the 1990s called and wants its bandwidth management strategy back. As Lee Badman points out in "4G? No, It's More Like 4Gee!" the data rates available to wireless consumers are growing rapidly and our demand is keeping pace. When you have high demand and data caps, the chance of overages is very likely, and the last thing anyone wants is out-of-control telecom costs. C
New Tool Vets Cloud Provider Security
News  |  3/27/2012  | 
Cloud Security Alliance registry allows customers to compare the security measures of participating service providers.
HP-Polycom Partnership May Boost Lync Adoption
News  |  3/27/2012  | 
HP and Polycom are taking their partnership to a new level, combining HP’s networking technology and Polycom’s videoconferencing products to deliver Microsoft’s Lync unified communications platform to the enterprise. An HP representative says that while many Lync licenses have been sold by Microsoft, several of those deployments are on hold because of the complexity of integrating the three elements--complexity that the two partners aim to address.
Facebook Password Debate Stirs Deep Social Fears
Commentary  |  3/27/2012  | 
Recent controversy over prospective employers requesting Facebook credentials has dredged up some big social questions.
Synchronizing Custom Dictionaries With The Cloud
Commentary  |  3/27/2012  | 
Everyone I know who writes about technology has developed an extensive custom dictionary file for Microsoft Office. Sometimes it seems every third word I write is a company, product name or some piece of tech jargon that Word doesn't recognize. Since I work on several different computers, I use SugarSync to keep my custom dictionary up to date.
Zero to Private Cloud in 8 Steps
Commentary  |  3/27/2012  | 
Here are eight steps for going from zero to private cloud. Note that I didn’t say eight "easy" steps. But don’t let that bother you--nothing that’s easy is ever worth doing anyway.
Arista Outpaces Cisco Again With FPGA Switch
News  |  3/27/2012  | 
Applications and initiatives like private cloud computing, virtualization and mobility are placing increasing pressure on network infrastructure to be faster and more capable. Initiatives like software-defined networking and protocols such as OpenFlow can make the network more flexible and manageable, but they don’t really solve the problem of application performance where high-speed, low-latency requirements are the rule. Only by removing hops and their attendant latency from the network
Cleversafe, DataDirect Unveil High-Performance Storage
News  |  3/26/2012  | 
Big data, high-performance computing applications get new storage appliance options.
Is Your Network Ready For Romley?
News  |  3/26/2012  | 
Server manufacturers have been quick to roll out new models designed to run on Intel’s new Xeon E5 family of processors, a.k.a. Romley, which touts an 80% performance improvement over earlier Xeon versions. As surely as the knee bone’s connected to the thigh bone, a boost in server performance is going to demand a bigger network pipeline. Networking vendors and other industry experts think the introduction of Romley is going to be a significant catalyst for adoption of 10-Gigabit Eth
4G? No, It’s More Like 4Gee!
Commentary  |  3/26/2012  | 
Have you actually held a 4G device in your hands while it does a speed test? Has your brain struggled to reconcile the numbers displayed at the end of the test with the fact that you’re connected to a mobile network and not Wi-Fi? Have you felt your reality get pleasantly rocked in a way that left you a bit confounded over the numbers that your device was showing you? This 4G stuff is simply amazing.
Social Phishing Spikes As Spam Declines, IBM Finds
Commentary  |  3/23/2012  | 
Improved Web application security leads attackers to be creative, reports IBM's X-Force Internet security team.
Compliance Issues Top 2012 Healthcare IT Agenda
News  |  3/23/2012  | 
What could be worse for IT departments than grappling with the issues related to Y2K? Ask a U.S. healthcare provider within the context of its top IT priorities for 2012 and the response may be government-mandated compliance.
The Upside-Down SAN
Commentary  |  3/23/2012  | 
Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground.
Hadoop Tames Big Data for the Enterprise
News  |  3/23/2012  | 
Big data can mean big opportunities for the majority of organizations, but only if they can make sense of the data in a reasonable amount of time.
Piston Delivers Private Cloud In Hours
News  |  3/23/2012  | 
IT departments looking to put up private cloud environments in a hurry, and without some of the complexity usually associated with cloud infrastructure, would do well to take a look at Piston Cloud from Piston Cloud Computing.
Security Professionals Get The Best Toys
Slideshows  |  3/22/2012  | 
Do you think penetration testers--the people that companies hire to break into organizations and test their defenses--remain immersed in the pale glow of a stack of monitors listening to techno and mainlining over-caffeinated fruit drinks? I was visiting Steve Stasikounis, CEO of Secure Network Technologies and Dark Reading contributor, last week in his offices, and he couldn't help showing off his latest penetration testing and forensic investigation tools.
Adobe Study: Social Media Undervalued Nearly 100%
News  |  3/22/2012  | 
Web analytics tend to undervalue social media by emphasizing the last click that leads to a purchase, instead of the first click that builds awareness.
Flat Network Strength Also A Security Weakness
News  |  3/22/2012  | 
Security is one of the biggest concerns and challenges for today’s interconnected systems, regardless of the network type deployed. However, the intricacies of flat networks bring new nuances to best security practices, which can be addressed by combining common sense with some industry-leading strategies.
Smart Taps Getting Smarter
News  |  3/22/2012  | 
Today’s networks are awash in traffic, making it difficult for administrators to find what is pertinent when diagnosing network packets for security issues and performance. Those harried administrators can turn to the latest smart taps to ease their packet gathering chores.
Quantum Dedupes Data Before It Hits The Cloud
News  |  3/22/2012  | 
Quantum, a provider of data protection and big data management, has announced a software platform to help customers take advantage of cloud-based data protection, using its vmPro technology and newly launched virtual deduplication appliance, DXi V1000. The company has also partnered with Xerox, which will use its underlying technology for its cloud backup and disaster recovery services.
WWPass: Only The Just May Pass the Authentication Test
Commentary  |  3/22/2012  | 
Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.
Page 1 / 4   >   >>


White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed