The Next Wave Of Enterprise Smartphones
Many IT pros have felt the pain of supporting the first wave of smartphones, but you're going to need to learn how to live with these devices--and be prepared for
He Said/He Said: VoIP Engineering Challenges
Over in our News Analysis section, we wrote up a story about a Network Instruments survey in which network engineers expressed concern about their ability to keep VoIP apps up and running. Our technology editors had their own thoughts:...
Xyratex Hits the Mark
Buoyed by its RAID controller business, Xyratex posts impressive first-quarter results
Rackable puts data center 'operators' behind the wheel - the tandem trailer wheel
If anyone is interested in the Hacking Intranets presentation I gave this week, video (which very poor audio quality, unfortunately), slides, and the demo code are available online. I'm not super-pleased with the results as I think I tried to...
No cookie for you!
In preparation for my upcoming presentation on web security and abusing browsers, I was going over the long list of protection measures that either aren't in place, or don't work against the potential threats, when I stumbled across one bright...
Vista in the Enterprise
Death. Taxes. Vista. Face it--some things are inevitable. We surveyed over 500 readers about the good, the bad and the ugly of Microsoft's latest desktop OS and developed a
Strategy Session: Judging Products
What makes a product right for one industry could make it exactly wrong for another industry. By exposing our detailed evaluation process, you can more effectively assess products for
Infosec World 2007
I'll be making a very brief appearance at Infosec World next week. If anyone's planning on being there and would like to stop by and say "hello", I'm unfortunately presenting at 8:30 on Tuesday, and leaving just after my talk....
OpenBSD Remote Exploit
OpenBSD is usually touted as one of the most secure networked operating systems. Of course, part of that reputation was gained because for years it's disabled unnecessary services (or even sometimes mostly necessary ones -- like SSH) by default. Still,...
Thank God for Regulations
In a switch, enterprises have reason to be grateful for the alphabet soup that makes up compliance laws
Who Gets The Cellular Bill?
According to soon-to-be-released research from In-Stat: The most effective way for an organization to manage its telecommunications resources is to treat wireless the way most organizations treat wireline services and other business productivity services. This means that users contract for...
Spam: Ninety Percent and Rising?
In an otherwise slow news day, this caught my eye, from an interview with Microsoft's CIO: Q: How about the things we are hearing a lot about--spam and spyware? A: We get a lot of spam. We get 10 million...
NWC @ VoiceCon
Network Computing's editors and tech experts were in Orlando this week reporting from the forum for business IP telephony. Here is a list of the news, analysis and highlights from the show: • New Nortel Unified Communications Products •...
Verizon recently won a lawsuit against SMS spammers. As e-mail providers, ISPs and enterprises have cracked down on e-mail spam, spammers have looked toward other mediums including instant messaging (discussed in Mike DeMaria's article this month on IM security appliances)...
Is storage headed for a fall, or just slimming down for the next big endurance event?
Wall Street - and the storage industry - ride the ebb and flow of the global economy
Air Time: Informationalist for Hire
A new breed of professional, informationalists are tech-savvy and focused on helping individuals and organizations function more effectively in an information-driven society.