Interop Video Previews
Interop New York 2011 is upon us. Starting Oct. 3 and running through Oct. 7, UBM's Interop show sill be taking place at the Javits Center. It going to be a full week, starting with pre-conference days on virtualization, cloud computing and CIO boot camp. Wednesday through Friday, the conference kicks off with three full days of in-depth sessions and panels covering virtually every aspect of IT. The expo hall will be open Wednesday and Thursday so you can meet with vendors and see the latest gea
Qlogic Fabric Freedom Equals More Convergence
The path to converged networking has to date been driven mostly from the networking side of the street. While we can argue whether Fibre Channel over Ethernet is more Fibre Channel or Ethernet, there's no argument that Cisco has been its biggest cheerleader. Qlogic's new Fabric Freedom product line provides a more storage-centric and incremental path to converged networking by supplying ports that can switch between 16-Gbps Fibre Channel and 10-Gbps Ethernet, with or without Fibre Channel over E
CloudFlare Rolls Out Free IPv6-to-IPv4 Translation Service
It may take a couple of years before an organization will have to make the switch to IPv6, but there is no question that the switch will be made. And the majority of IT professionals aren't prepared. According to a recent survey, 80% of about 2,400 respondents feel they are not educated enough on the subject to perform an IPv6 migration, half don’t know which of their network elements support IPv6 today, and 70% are concerned about whether they can successfully implement an IPv6 deployment
QLogic Sets The Stage For Networking's Future
Networking and ASIC developer QLogic is building out its Adaptive Convergence strategy with new adapters, switches and routers that power 16-Gbit Fibre Channel or 10-Gbit data center Ethernet networks from the same hardware. The company's portfolio offers "any-to-any" connectivity by building in TCP/IP, iSCSI, FCoE and native Fibre Channel. The announcements included FlexSuite adapters, Universal Access Point switches and intelligent Storage Routers (iSR).
Most Organizations Fall Short On PCI DSS, Verizon Reports
This year's Verizon 2011 Payment Card Industry Compliance Report validates the findings of the first report issued last year: About one in five organizations for which Verizon provided QSA services were fully compliant in their Initial Report on Compliance (IROC), but the balance were found lacking, on average passing about 80% of the QSA evaluation tests.
No One Uses GPS, Do They?
There are some technologies that you just don't monkey with. Running water, for example. And the global positioning system that is the enabler to about a zillion different location applications found in many aspects of modern civilized life. But courtesy of newcomer 4G wannabe LightSquared, a somewhat exotic mobile network technology threatens to lay functional waste to millions of consumer, commercial and military GPS-enabled devices.
10 Social Networking Don'ts
Savvy IT pros know how to guide and support their organizations' social efforts--and know how to avoid mistakes that can cause internal and external trouble.
Meg Whitman Replaces Apotheker As CEO At HP
In a surprise development, HP has named former eBay CEO Meg Whitman to replace Leo Apotheker as president and CEO of Hewlett-Packard, based on disappointment in Apotheker's failure to execute on the company's new strategy. Whitman pledged support for HP's strategy of building its enterprise software business and making a decision by the end of the year on whether to spin off its Personal Systems Group (PSG), which sells desktop, laptop and tablet computers to consumers.
Proprietary Networking Kills Opportunity
When we ask IT about proprietary vs. standards-based purchases, the majority of responses indicate that standards are nearly always preferred. So why are the network fabrics proprietary? There is a disconnect between what we are hearing from IT and what vendors are offering, and it seems to me that vendors are collectively shooting themselves in the foot.
Email Drives Daily Deal Websites
Social media and email complement each other and can fuel sales on daily deal sites, according to email service provider StrongMail.
Bringing IPv6 To A Venue Near You
IPv6 is happening, worldwide. Interest groups of all sizes are needed to help spread knowledge and best practices about the implementation projects we will all eventually face.
Anue Network Monitoring Switches Handle 40G Networks
Anue Systems is releasing what it says is the first network monitoring switch that is intended to help manage networks of up to 40 Gbit. Network monitoring switches perform tasks such as filtering out only a particular type of network traffic and then routing it to a network monitoring tool specifically intended to manage that traffic but that might not have the capacity to handle and filter that volume of traffic itself.
Dome9 Offers Cross-Platform Cloud Security Management Service
Start-up Dome9 Security's SaaS offering provides centrally managed, cross-platform, native security controls for cloud-based infrastructures. The hosted service provides security for public and private cloud infrastructures, as well as for dedicated and virtual private servers (VPSes).
Probing The State Of The Flow Record Data Market
When it comes to network monitoring, probes appear to be an endangered species in large organizations, according to a new study from Enterprise Management Associates (EMA). Conducted on behalf of Lancope, a vendor of NetFlow-based solutions, the research examined the usage, priorities and practices surrounding network-based flow data records, also known as Flow Record Data, including NetFlow, sFlow, jFlow and IPFIX.
Security: Living In A State Of Compromise
The bad guys appear to be winning--or, at least sharing information on vulnerabilities and attack methodologies--faster and more readily than the good guys, and the regulatory environment is lagging reality, says RSA's Chief Security Officer Eddie Schwartz. "What is out there in the public [regarding attacks] is the tip of the iceberg of what's really happening."
Google+ Releases First APIs
Initial set of application programming interfaces provides access to profiles and activity streams on Google+.
Extreme Networks' Pint-Sized Wireless Powerhouse
In this era of waning wired client connectivity, there are lots of used and vacant UTP runs scattered about. At the same time, many wireless access points are poor candidates for taking advantage of the typical knee-high data jacks that pervade most modern buildings. And then there’s the slick little Snap-On Wi-Fi access point from Extreme Networks, which brings an innovative form factor and decent feature set to market.
10 LinkedIn Tips for IT Pros
Your career arguably depends on your LinkedIn presence. Here are 10 tips for making the most savvy use of the business social network.
Tufin Looks To Take Firewall Management To The Next Level
Tufin Technologies has long offered tools for managing firewalls and has even provided capabilities to monitor next-generation, application-aware firewalls. But with the release of the Tufin Security Suite 6.0, the company makes it possible to directly set and define next-generation firewall policies from their management tools.
Blue Coat Triples Cache Performance
A leader in the WAN optimization controller market, Blue Coat Systems is supercharging its CacheFlow 5000 appliance with more than three times greater throughput and cache storage in the same 4U footprint. Targeted at service providers, and now shipping with IPv6 support, the upgrade is intended to address the explosion of rich Web 2.0 content, especially videos and large files that are "severely straining service provider networks, making it challenging to both provide a top-quality user experi
Cisco Rolls Out IPv6-Ready Carrier-Class Routers
Cisco has announced three additions to its ASR 9000 Series Aggregation Services Routers System portfolio. As with all of its new releases, the latest service provider offerings are IPv6-ready, but it's the mobile solution that is expected to be the big draw initially. The network giant says the proliferation of mobile Internet services and devices such as tablets and smartphones are fueling demand for bandwidth and quality experiences.
Co3 Tackles One Of Security's Hidden Costs
Billions are being spent annually on protecting information, but Co3 Systems is offering a unique solution for what to do after a data breach occurs. The Cambridge, Mass., software-as-a-service (SaaS) startup is announcing an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more efficiently. Its solution can cut incident response process time by as much as half, and can significantly reduce the risk, expense
HP Shakes Up Security Market
While HP has caused a furor with the uncertain future of its PC business, what is clear is its desire to be a player in the enterprise security market. The world's largest IT vendor is making a number of announcements around its Enterprise Security Solutions portfolio that will provide the required protection combined with access to the right assets without compromising risk.
Certificate Authority Compromises Are Global In Reach
There has already been a lot written about the compromise at DigiNotar, GlobalSign and Comodo. One day we will look at the summer of 2011 as the time when the PKI collapsed. That's not hyperbole. The problems with certificate authorities and the inherent weakness they present have been known for years--a fact we alluded to as far back as 1997. Browsers accept certificates as trusted in that they have the signing CA certificate in their local browser store. Browsers do not check that a particular
Imperva Unveils Scalable Cloud-Based DDoS Protection
Imperva is launching a new subscription service, starting at $12,000 a year, that will provide protection against the majority of DDoS attacks, says Rob Rachwald, director of security strategies. Powered by Imperva’s cloud-based subsidiary Incapsula and scaling up to 4 Gbps, key capabilities include defense against all types of DDoS threats, including network-based attacks, like SYN or UDP floods, and application attacks.
Automation and Orchestration
Now that virtualization is either implemented or under way at most organizations, vendors are focusing on orchestration and automation of their infrastructure to extract pounds instead of pennies from their customers. The vision that is espoused by vendors goes something like this: Companies are spending time and resources to build servers, script OS and application installations, make storage array and network configuration changes, deliver firewall rules etc., etc. If only we had some clever s
Certificate Authority Hack Points To Bigger Problems
What with hurricanes, earthquakes and Kardashian weddings dominating recent media coverage, you may have missed the news about a recent security breach that clearly displayed a serious weakness in one of the core security mechanisms of the Internet.
HP Continues To Nip At Cisco's Heels In Q2 Enterprise WLAN Sales
The enterprise accounted for almost half of the very robust wireless LAN revenues in the second quarter, according to two new reports. Dell'Oro Group put the market growth at 24%, driven in large part by the enterprise segment, which surged 40%. IDC reported year-over-year revenue growth of 29.7% for the overall market, reaching $1.52 billion, and up 13.4% from the first quarter. Enterprise spending grew 43.4% year over year to nearly $725 million, and 21.9% quarter on quarter.
Trend Micro Looks To Secure Cloud And Virtual Systems
While security concerns don’t always get the attention they deserve in discussions about the cloud and virtual infrastructures, this week’s VMworld 2011 conference saw an increased interest in security solutions. Joining this trend was security vendor Trend Micro, which announced Deep Security 8, a product that adds increased capabilities for monitoring and securing virtual environments.
IPv6 Design: Forget The IPv4 Rules
You've acquired a nice new IPv6 address block, and now you need to come up with an IPv6 address allocation design for your network. If there is one bit of advice I can offer you as you begin your IPv6 address design, it's this: Abandon almost everything you've learned about IPv4 address design. Throw it right out the window.
VKernel Boosts VM Management With Version 4 Of Its vOperations Suite
Virtualization management software vendor VKernel has announced version 4 of its vOperations Suite software, which adds support for the Microsoft Hyper-V hypervisor, a visualization engine called vSCOPE and a virtualization cost index called vCI to help IT administrators get more information about virtual machine (VM) performance, capacity and cost across data centers, resources and hypervisors. The software now also includes Smart Business Views, which lets IT administrators build collections o
Here’s a puzzle for you: What do a new Dodge Ram pickup truck, a digital road sign, a young English lady’s cell phone and a modern lighting control system have in common? They’re not all necessarily made in the same Third World country, if that’s what you’re thinking. But they are all exploitable by virtue of their network connectivity, and the implications can be quite worrisome.