Expert Analysis
Content posted in June 2010
<<   <   Page 5 / 5
HP Forecasts Increased SMB Spending, Rolls Out New Products
News  |  6/4/2010  | 
HP has launched a number of initiatives to win sales in the small-to-medium-sized business (SMB) IT market. The company is offering new storage and networking hardware and financing deals amid evidence of increased IT spending by customers. HP introduced three new data storage products, revamped its network switch lineup to include products from its acquisition of 3Com and is configuring HP hardware to work in Microsoft's Unified Communications environment. In addition, HP's Financial Services d
Five Boutique APM Vendors To Watch
Commentary  |  6/4/2010  | 
The shift from infrastructure management to application management for enterprise organizations has resulted in a renewed interest in end-to-end Application Performance Management (APM). When we reviewed APM products two years ago, it was one of our largest lab reviews that we performed. We tested suites from BMC, Compuware, Indicative (purchased by Nimsoft), NetIQ, NetQoS, Network General, Nimsoft (purchased by CA), Quest Software and Symantec (spun back out as Precise). Those vendors continue
Tech innovation -- San Francisco Giants Sytle
Tech innovation -- San Francisco Giants Sytle
Network Computing Videos  |  6/4/2010  | 
How the San Francisco Giants CIO sees his IT priorities, and a deeper dive into how they've employed Voice Over IP to save money and drive innovation.
Correlsense Teams With IT Services Provider OnX
News  |  6/4/2010  | 
Application performance and business transaction management provider Correlsense, based in Framingham, Mass., is broadening its market reach to the north. The company announced last week it has partnered with OnX, a Canadian provider of managed IT services including managed hosting, infrastructure services, application management, and professional services.
FCoE Adapter Market Noise
Commentary  |  6/3/2010  | 
A series of news items and blog posts have me worked up about the FCoE adapter market. First Emulex and Qlogic both managed to find evidence in the the latest Dell'Oro Group market research report that they were gaining market share. Frankly it was a bit Orwellian reading the battling press releases. Then my fellow NWC blogger Tom Trainer asked the engaging question "Are Converged Network Adapters Suffocating the Virtual Machine?" pointing out that some CNAs might consume more than their share
WAN Optimization: Adoption Holds Steady, Despite Advances
News  |  6/3/2010  | 
The notion of converged services along with distributed workforces and the buzz around private clouds have created a perfect storm of stress on the WAN. Are optimization appliances the answer?
WAN Optimization: Adoption Holds Steady, Despite Advances
News  |  6/3/2010  | 
The notion of converged services along with distributed workforces and the buzz around private clouds have created a perfect storm of stress on the WAN. Are optimization appliances the answer?
Android Rootkit Developed
News  |  6/3/2010  | 
Could your Android smartphone be used against you? The answer is yes --at least theoretically. "We have developed a kernel-level Android rootkit in the form of a loadable kernel module," two security researchers from Trustwave, Nicholas Percoco and Christian Papathanasiou, recently announced via the Def Con website. Once the rootkit was running on a Linux-based Android smartphone, an attacker could call using a "trigger number" to then gain "full root access on the Android device" via TCP.
Kerio Launches UTM For Network Security
News  |  6/3/2010  | 
Kerio Technologies is launching Kerio Control, a unified threat management system that offers multiple security features in a single product. Based on Kerio's WinRoute firewall, Control adds intrusion detection/protection based on the open-source Snort software. Other new features include the ability to allow data traffic based on MAC addresses, as well as an embedded Sophos antivirus engine that provides the option to scan all inbound and outbound Web, e-mail, and FTP traffic for malware. Contr
If It's Not Broke, Break It
Commentary  |  6/3/2010  | 
In my last entry (http://www.networkcomputing.com/backup-recovery/the-challenges-of-legacy-storage.php) I covered some of the challenges that legacy storage vendors have when adding previously unthought of capabilities to a storage system not designed to support them. At some point though does it make sense to start fresh and leave the legacy platform behind, basically breaking what isn't broken?
The Challenges of Legacy Storage
Commentary  |  6/3/2010  | 
Sometimes it's tough being a legacy storage supplier. To maintain backward compatibility, your early success sometimes becomes your greatest inhibitor. We've seen some of these legacy vendors struggle to bolt on capabilities like virtualization and thin provisioning to existing platforms. There is foundational change being driven by hardware advances like Solid State Disk (SSD), Serial Attached SCSI (SAS) and Massive Array of Idle Disks (MAID).
WAN Security Challenges Abound
Commentary  |  6/3/2010  | 
Protecting information and corporate assets has always been a tricky business, and today's computing environment just adds to the complexity. Remote offices and mobile users need just as much protection, and possibly more, than headquarters employees who sit behind carefully constructed layers of defense. SaaS applications and public cloud deployments mean sensitive data travel outside traditional network boundaries. And the Web presents a never-ending fountain of malware.
Force10's Deep Buffer Switch
News  |  6/3/2010  | 
Force10's new S60 to of rack switch demonstrates that with all the buzz around 10Gb Ethernet, 1Gb still has some legs in the data center. Enterprise IT is still buying servers with 1 or more Gb NICs on the motherboard. Until 10Gb LAN on motherboards is the norm, which will drive 10Gb pricing downward, Gb will be here to stay. There isn't much that is earth-shattering about the S60, but is a welcome addition for Force10's existing customers.
A WiliGear Walks Into A Bar...
Commentary  |  6/3/2010  | 
I'm a fan of the underdog. I love to see small players make good in the world of dynasties, and I am tickled pink with what Open-Mesh is doing on the cheap while the likes of Cisco, Aruba, Meru and the other wireless big dogs continue to fetch an ever prettier penny with their wireless solutions.
IT Hall Of Shame
News  |  6/2/2010  | 
Six 802.11n Routers
Slideshows  |  6/2/2010  | 
These network workhorses from Asus, Belkin, Buffalo Technology, D-Link, Linksys, and Netgear all keep PCs, modems, hard drives, and printers online. Where they vary is on price and features.
Tomorrow's Network Automation Today
Commentary  |  6/2/2010  | 
Switch infrastructure vendors are leading the way in opening up a broad set of capabilities for network engineers. Network automation, or network scripting, combines the functionality of network infrastructure devices with simple scripts that empower network engineers to move beyond passive network monitoring and post-mortem analysis to real-time adaptive networks. The question is will it work and how can you use it in a practical manner?
SMB Security Monitoring Gaining Sophistication
News  |  6/2/2010  | 
Preventing breaches and attacks is increasingly driving security information and event management tool adoption for small and midsize businesses.
Brocade New 10GbE And FC Modules Increase Capacity
News  |  6/2/2010  | 
Brocade is doubling its 10GbE capacity in its flagship MLX router platform and increasing the capacity of the company's DCX Backbone SAN Switch. The need for higher density and higher capacity network and storage infrastructure is driven by the increased use of virtualization in the data center and the explosion of data that needs to be stored and accessed. However, rack space and square footage in existing data centers is at a premium. Increasing density is the logical step in supporting denser
Radware's APSolute Attack Prevention Packages IPS, SEM, Consulting
News  |  6/2/2010  | 
Radware's APSolute Attack Prevention is a combination of Radware's DefensePro appliance, APSolute Vision for threat management including reporting and management, and the Emergency Response Team service. The combination of the three services and products packages the necessary components for attack management. As more data us housed and accessed from off-site locations, the need to protect data over the WAN is critical.
Minnesota DoJ Uses Biometrics Streamlining Security, Paperwork
News  |  6/2/2010  | 
When the Minnesota Department of Justice began its eCharging program, the goals were to streamline workflows and to reduce the amount of paperwork between law enforcement agents in the field and the court system. Paperwork backlogs adversely affected productivity, and law enforcement officers in the field received the added benefit of not having to key in unique user ID and password combination for 10-12 different law enforcement databases that they regularly accessed from laptops in squad cars.
Sonian Archives Social Media
News  |  6/2/2010  | 
As employees increasingly send data over systems not controlled by the company, such as social media, organizations have had to struggle to keep track for audit, compliance and eDiscovery purposes. For this reason, Sonian recently enhanced its cloud archiving service to support archiving of social media and instant messaging communications, including that performed on smart phones.
WAN Encryption: Just Do It
Commentary  |  6/2/2010  | 
One my philosophy professors asked the question "Where is your car parked?" I told him where I parked it. He then asked me how I knew it remained where I left it. "Is it possible," he asked, "that a group of pranksters picked it up and moved it elsewhere?" I'd pulled that prank, so I knew it was possible. Then he asked, "What if one set of pranksters moved your car elsewhere, and then another set of pranksters moved back to the spot where you left it by coincidence? Would I know?" The exercise g
Skype iPhone Calls To Carry Fee
News  |  6/1/2010  | 
Apple iPhone users will get a host of new features in Skype 2.0, as well as a charge for using the VoIP service on AT&T's network starting next year.
Dell Kace Updates K1000 Management Appliance
News  |  6/1/2010  | 
The company formerly known as Kace now known as Dell Kace after its acquisition by Dell earlier this year, has released version 5.1 of its K1000 Management Appliance. The new version has enhanced power management and service desk capabilities. In addition, the company enhanced its Smart Label labeling technology, which lets users logically define groups, to add support for hierarchies and to apply labels dynamically based on search criteria and which can automatically place labels on new assets
F5 Optimizes Microsoft Solutions Enabling The Dynamic Data Center
News  |  6/1/2010  | 
F5 Networks, Inc., the global leader in Application Delivery Networking (ADN), today announced enhanced application delivery capabilities to help Microsoft customers implement dynamic infrastructures that can quickly respond to changing business needs and variables. With F5 solutions optimized to work with Microsoft technologies, customers gain strategic points of control throughout the infrastructure, giving IT the ability to access and allocate resources on demand. Specifically, F5 is announci
HP Invests $1 Billion To Launch New Era Of Enterprise Services
News  |  6/1/2010  | 
HP today announced that it would invest $1 billion in the next generation of its Enterprise Services business. The transformation, to be built on HP's market-leading technology and software, will benefit clients through new offerings and improved service delivery. HP will invest in fully automated, standardized, state-of-the-art commercial data centers built on its Converged Infrastructure and operated by its industry-leading management software. Leveraging its experience from its own IT transfo
CDW Security Straw Poll: Data Loss Is Corporate Enemy Number One
News  |  6/1/2010  | 
CDW LLC, a leading provider of technology products and services to business, government and education, today announced the results of its IT Threat Prevention Straw Poll, based on a survey of 200 information technology (IT) security managers and decision makers at medium and large businesses across the United States. The survey investigated their impressions of IT security threats and the measures businesses are taking to prevent or mitigate them. Among all current IT threats, 37 percent of busi
Radware Launches All-Inclusive Security Solution To Protect Data Centers & Networks From Hybrid Attacks
News  |  6/1/2010  | 
Radware, a leading provider of integrated application delivery solutions for business-smart networking, today announced an industry first - APSolute Attack Prevention - a unique security solution that connects several defenses together, allowing them to work synchronously - and provide network and data center infrastructures with comprehensive protection from hybrid network attacks that pose threats such as: application vulnerability, information theft, authentication defeat, malware spread, net
Application Performance Aggregation: The Next Wave In Cloud APM
Commentary  |  6/1/2010  | 
As organizations start the slow move toward cloud computing and begin deploying more of their infrastructure in off-premise private cloud environments, the challenge of end-to-end APM becomes increasingly complex. Application Performance Aggregation (APA) as the next big wave in end-to-end application performance monitoring (APM) and where the APM market will be in a few years.
GridApp Automates Database Management
News  |  6/1/2010  | 
GridApp Systems Inc. has announced a new version of its Clarity application that makes it easier for organizations to perform database automated functions such as applying patches. GridApp Clarity Version 6.5 makes the product more self-service, meaning organizations can use operations staff and system administrators to apply database patches, as opposed to more expensive, scarcer database administrators. In addition, the new version of Clarity has an enhanced API to enable integration with syst
<<   <   Page 5 / 5


Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Video
Twitter Feed