Content posted in February 2005
Saying Goodbye to Apple's employee #31
Commentary  |  2/28/2005  | 
In a world dominated by Windows-Centric machines, some may claim that the Apple user is a dedicated one, their devotion to their Macs almost romanticized. Of course if it weren't for Jef Raskin, that 'love story' might never have come...
Podcast: Tideway Systems' Richard Muirhead
Commentary  |  2/27/2005  | 
Tune in for a quick interview with Richard Muirhead about the roadblocks to IT transparency that crosses both business, applications and infrastructure. If the IT gods are smiling and you own an iPod or an RSS reader that enjoys enclosures...
Eclipse - Not just for developers anymore
Commentary  |  2/25/2005  | 
Earlier this week Sybase announced they would sponsor and lead a proposed Data Tools Project for Eclipse and will exhibit new developer tools for the Eclipse platform at EclipseCon. Sybase isn't the first, and certainly won't the last, major ISV...
The Trouble With Mergers
Commentary  |  2/25/2005  | 
When big companies assimilate tech pioneers, they tend to extinguish their all too important innovative spark.
The IT Agenda: Consultants: Make IT Services a Custom Fit
Commentary  |  2/25/2005  | 
The value of consulting lies in the customization of deliverables. Here are some tips and tricks to fine-tune that plan of action.
Warning Warning: Windows NT Support Ending
Commentary  |  2/24/2005  | 
Those whacky kids at Novell are at it again with a commercial spotlighting a dangerous new mental illness running rampant through Windows NT-dependent IT administrators. It's called Service and Support Termination Trauma, SSTT for short. Deranged? Dangerous? Inspired? No. This...
Virtual Servers
Commentary  |  2/23/2005  | 
Are you using technology like VMware for production systems or maybe to create yourself a great development environment? The promise of better server utilization is there. We all realize how low processor power is really used by many of our...
The Baddies Stay Current
Commentary  |  2/23/2005  | 
Give the virus baddies one thing: They keep up with current events. Two viruses making the rounds play off recent news events as part of the ploy to convince users to open the payload. First, on February 22 the FBI...
Storage Security Products and market maturity
Commentary  |  2/22/2005  | 
If you've been considering Storage Security products, but remember the past too well, you might think that your options are limited. I was actually rather surprised at the breadth, quality, and ease of use of most of the products available...
Net Waves: Public Wi-Fi: Is it Good Enough?
Commentary  |  2/17/2005  | 
While there are ample benefits in the design and configuration of a Wi-Fi network the size of a city -- there's also plenty of room for errors.
Metro Wi-Fi: Shooting the Messenger?
Commentary  |  2/17/2005  | 
Enterprise IT professionals who have deployed large-scale Wi-Fi networks have long understood that much higher build-out costs are required to deliver secure, reliable and scalable services.
Net Waves: Voice Over Wi-Fi: Are You Prepared?
Commentary  |  2/17/2005  | 
Make no mistake -- voice over Wi-Fi will become the killer wireless LAN application that we've been waiting for.
The Call of Cthulhu's iPod?
Commentary  |  2/16/2005  | 
Do you think as the ancient, Lovecraftian horror Cthulhu lies "Dead but Dreaming" in his sunken city, he cranks up a little Foghat on his iPod to drown out the sounds of the insignificant insects (read: us) above him? If...
Notes from the Lab
Commentary  |  2/16/2005  | 
We've all heard about "security through obscurity", but working in labs has taught me that absolute clarity is much more secure than is confusion when it comes to know which devices and segments are connected to the network. With that...
Bill Gates Keynote at RSA
Commentary  |  2/15/2005  | 
During his keynote today at the RSA Conference, Bill Gates quoted a Gartner report claiming that 75% of all vulnerabilities are application related. Mr. Gates then promptly blamed Microsofts' development tool customers for those vulnerabilities. Well judging by the rate...
Free Software at RSA
Commentary  |  2/15/2005  | 
Recalling the days of big box software, Shavlik's marketing schtick is bound to be a hit, especially with the color blind....
RSA Protesters?
Commentary  |  2/15/2005  | 
The crowd was unruly. Chanting and waving placards. While there was no violence, this motley crowd -- from Bluecoat -- made me just a bit nervous....
The Tags are Coming
Commentary  |  2/15/2005  | 
I've been spending some time thinking about the whole topic of RFID and privacy, trying to sort out some of the conflicting claims about privacy versus security and institutional convenience. Now, I'm a reasonably serious privacy advocate--I think that we...
Technology, meet Market
Commentary  |  2/15/2005  | 
The writing is on the wall, and you should be aware of it. If you are using a cheaper storage system (NAS or iSCSI), or considering a purchase of one, you should be aware that this market is flooded, and...
XML Firewall Testing
Commentary  |  2/15/2005  | 
Part of our "Firewall Blowout" plan includes a thorough test of XML Firewalls. We tested XML/Web Services Security Gateways almost two years ago and the space has changed dramatically in that time. Not only did we see a lot of...
Business Process Management, NWC Inc. Style
Commentary  |  2/15/2005  | 
We're in the early stages of preparing for a "BPM Blowout". Our plan is to model a set of processes for NWC Inc. in order to evaluate BPM suites. We've had many discussions on the subject already and will begin...
Web Service Vulnerability Alert Service
Commentary  |  2/15/2005  | 
Forum Systems has launched the first of its kind Web services security alert service. Forum VulCon is an alert service focused on the growing category of XML/Web services threats. This is a FREE subscription that can be accessed via Web...
RSA Conference Survivor Kit
Commentary  |  2/15/2005  | 
The RSA Conference has yet to kick off and already the attendee swag is pouring in. Good PR is not dead at Vernier Networks. Just in time for the show, we received our Survivor kit. The box contained everything an...
OpenSource Everywhere
Commentary  |  2/14/2005  | 
It seems that at least once a day I receive an e-mail announcement regarding another commercialized open source product. Last Friday it was another on-demand CRM system, today it was a portal. Seems like the folks over at ObjectWeb are...
Oh Goody -- FireFox Malware and Worms On the Way!
Commentary  |  2/14/2005  | 
While it does sound rather pessimistic, I guess you can't blame the industry experts who predict that FireFox's extreme popularity will cause it to start attracting viruses, spyware, and other nasties very soon. One analyst predicts at least two exploits...
In Focus: The Meaning of MIMO?
Commentary  |  2/13/2005  | 
Nobody doubts that MIMO (Multiple-Input/Multiple-Output) dramatically increases the speed and range of wireless LANs. That's why WLAN vendors have been rolling out routers and interface cards that include the intelligent antenna technology....
Song Boy Lives!
Commentary  |  2/11/2005  | 
Rest in peace "Star Wars Kid." There's a new king of the unintentional performance art hill, Song Boy. Just don't let Mike DeMaria know that he has a new high-water mark to reach for....
Reality IT: Server Consolidation Takes Time
Commentary  |  2/11/2005  | 
No matter what you may hear, an initiative like this is not as straightforward as it seems. And smart IT people know enough to take their time--or risk making a
Telecom Players Devoid of Vision
Commentary  |  2/11/2005  | 
Verizon's interest in acquiring MCI is a case of another amalgamated former Bell company pursuing another weakened long-distance provider.
The Delicate Balance of Wireless Security
Commentary  |  2/11/2005  | 
Wireless security demands the juggling of technology, risk assessment and politics--and more effective industry solutions.
A SAN is a fragile thing, really.
Commentary  |  2/10/2005  | 
So in a test lab life is not like in an enterprise environment. I cannot be, of course. Our job is to pull a bunch of pieces of hardware and software together to make a test configuration, run our tests,...
Sweet CRM
Commentary  |  2/9/2005  | 
SugarCRM has just released version 2.5 of its open source CRM suite, SugarCRM. SugarCRM is based on the LAMP (Linux-Apache-MySQL-PHP) architecture and runs on virtually every platform available, though the company prefers to promote Linux as its OS of choice....
Harry Potter and the Fiendish Phishers
Commentary  |  2/7/2005  | 
No, its not the name of the next book starring a certain young wizard-in-training. But young Mister Potter now has something in common with Phishing -- he's an unwilling particpant in a new scam. Potter Author JK Rowling has warned...
Firing David Lightman
Commentary  |  2/3/2005  | 
Got quite a few emails about my recent article No Profit in a Fast Employee Axe dealing with the situation where we had to eventually fire an IT employee for low performance. As you note from the article subject we...
I MSN Search'd It!
Commentary  |  2/1/2005  | 
I was happy to see yesterday that Microsoft at last unveiled its revamped (non-Yahoo) search engine, From cursory tests, the engine appears to function as well as it should. It knows where to find us, anyway. However, in reading...

White Papers
Register for Network Computing Newsletters
Current Issue
Research: 2014 State of the Data Center
Research: 2014 State of the Data Center
Our latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
Twitter Feed