Who's Growing a GPON?
Reliable sources say gigabit PON is on the drawing board of at least one major access supplier
You may have noticed over the last week that our site blog (blog.networkcomputing.com/sitecontent.html) has started redirecting to blog.networkcomputing.com/nwcfeed/. This is our first step in migrating all of our weblogs to Movable Type from Blogger. Blogger has been great, but with...
Complete issue now online
Hi folks. We've just published the final installment of our June 26th issue, featuring a comprehensive review of Instant Messaging software by Mike DeMaria and a workshop on long term data storage by Steven J. Schuchart Jr. We have also...
Overland Captures Okapi
Overland buys iSCSI startup for $5M as it prepares to dive into the disk-based backup market
EarthLink Exalts EMC
ISP buys a slew of EMC gear, including a DMX1000, claiming it beats HDS on price and performance
ADIC Sticks In Some Disk
Plans to offer an ATA-based disk option for its Scalar i2000 tape library by the end of the year
Pirates of the Internet: Curse of the MP3
While driving into work this morning, I heard the radio DJs talking about the music industry's latest attempt to stop mp3 music file sharing and downloading -- they plan to sue individual users. Specifically, they're going to begin slapping lawsuits...
Smart WLAN Cells
Propagate, a start-up based in Acton, Mass., has developed software that allows for the implementation of what is called self-organizing wireless LANs.
Long-Term Care for Your Data
Today the challenge is managing digital media to ensure that your storage hardware can access your data years from now.
eHelp Corp. RoboHelp X4; Eset Software NOD32 2.0; Netsec Specter 7.0; Eiffel Software EnVision 1.1
Microsoft Sweetens Sour Licensing Scheme
Engineers may still believe that technology sells products, but businessmen and lawyers will tell you otherwise. You need to put the technology in a product, license it and couple it
Are You Vulnerable?
Of course you are. But implementing systematic vulnerability management will reduce your exposure.
Authentication Gets Into Stanford
Stanford University, fresh off its first installation of firewalls, recently added an extra layer of authentication to its wireless LAN after finding that registering MAC (Media Access Control) addresses left
IM Grows Up
We tested seven products that deliver instant messaging you can control, with security and handy collaboration features.
Fluke's OptiView Analyzer broadens the scope of your monitoring.
new issue online
Hi folks. We've just published the first installment of our June 26th issue, featuring a very extensive feature and review on vulnerability management tools by Greg Shipley and Kevin Novak respectively. We've also published a number of new site features,...
OPINION: Linux Is Not Ready For the Enterprise
Linux and other open source projects require too much customization, and doubts about the legitimacy of open source code could get users tangled up in lawsuits. Besides, many Linux supporters
Evening from Hell
The Netbotz environmental monitoring in the lab began to send me email yesterday afternoon, telling me that the lab was up to about 95 degrees. Oh, boy. I was busy, so I called Lori who when down there and shut...
VA Scanners Pinpoint Your Weak Spots
We tested 11 vulnerability-assessment products and each had imperfections. We liked Foundstone's FoundScan the best, thanks to its detailed reporting and scalable design.
Reversals of Fortune
Reversals of Fortune McData has been surging - and now Cisco's No. 1 target is Mickey D, not Brocade
XOsoft Turns Back Time
Startup launches software for 'undoing' corrupt transactions. Does it have a jump on the field?
You're Insane! No I'm not...Yes I am!
A few weeks ago, we asked you kind folks to submit the Top 11 reasons you can tell your summer intern is insane. Well, as a sneak peek -- here's the entries that didn't make it to the Top 11...
IM Gets Regulated
Storage vendors are ROFL as NASD rules that financial institutions must archive instant messages
Brother can you spare a dimensional warp generator
Right from my spam filter to your news feed, I'm please to bring you the return of the dimensional warp generator spam in its entirety. I know I'm only encouraging the author, but this is just too good to trash....
3PAR Spins Disk Trick
Claims Thin Provisioning feature drastically reduces underutilized storage. Will it get 3PAR in the door?