Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "Google"

Total Search Results : 350

Proofpoint Extends Data Protection To Box File-Sharing Cloud

February 28, 2012 11:00 AM
Data protection vendor Proofpoint is using this week's RSA Conference 2012 to announce it is partnering with the cloud-based file-sharing site Box.com to extend data protection to users of the popular service. Proofpoint already provides data protection as a service for a customer's e-mail, Web and social media communications to prevent sensitive customer or company data from being exposed. Just like social media, employees are choosing themselves to use file-sharing sites to get their work done, and IT managers need to adapt, a Proofpoint executive says

Cloud Security: No Guarantees

February 17, 2012 11:00 AM
When adopting a cloud service--whether it's software as a service or platform as a service--enterprise IT organizations frequently make the assumption that the provider's security will be an improvement over the security of their own on-premise systems. Verifying that this is true, however, is tricky, and, in the end, there are no guarantees.

Time To Buckle Down And Start An IPv6 Project

February 08, 2012 11:00 AM
While the Internet Society (ISOC), a global Internet standards-setting group, has seen a pickup in adoption of IPv6 by some measures, conversion from the IPv4 standard is still relatively slow. The ISOC has scheduled another IPv6 Day for June 6, hoping to build on the momentum for adoption of the new Internet Protocol from IPv6 Day on June 8, 2011. In a three-part series, Network Computing will look at how companies can develop a road map for IPv6 conversion, the technical implications of running IPv6 on an existing IPv4 network, and what compliance and security issues have to be addressed in a transition.

Rise Of HTML5 Brings With It Security Risks

January 24, 2012 08:30 AM
HTML5 is the new "it" protocol on the Internet. Among other things, it is an alternative to Adobe's Flash for displaying content through a Web browser. No less an industry authority than the late Steve Jobs declared in 2010 that browsers on Apple devices such as the iPad would support HTML5 and not Flash. But as HTML5 gains wider adoption, some of its security flaws are beginning to get noticed, including the WebSocket specification that renders Web pages more quickly than does Flash.

Google Voice Saves The Day

October 12, 2011 12:40 PM
This week I'm on the road at SNW in Orlando and then to speak at Dell's Tech Summit internal event leading into Dell World in Austin. During all the chaos of interplanetary travel, I rely heavily on Google Voice and its ability to track me down like a dog. When I discovered yesterday that my cell phone had gone among the missing, Google Voice once again came through for me.

Lee's Diggin' Motoroogle

August 16, 2011 07:53 AM
The purchase of Motorola’s mobile line by Google is a good thing by any name, if you ask me. This is an issue of keeping the force in balance, of yin and yang. There are far bigger issues at work here than mere devices, and Google’s move is good for everyone.

Single Point Of Failure: The Internet

June 01, 2011 07:00 AM
No matter how well you architect for redundancy and availability, there will certainly be single points of failure (SPOF) that you can't account for. The SPOF, in all of its forms, can make application mobility via VDI, cloud services, and netbooks like Google's Chromebook less attractive computing options when compared to fat clients, fat servers, and boring but reliable storage. While services can fail, let's not forget that the most frequent SPOF we deal with is the access networks at the Internet edge.

Could EMC Become The Amdahl of Cloud Storage?

February 11, 2011 05:59 PM
There is no doubt that EMC has shipped some Atmos storage since its introduction. Yes, EMC has Atmos. And the company claims that Atmos is specifically designed for the cloud. However, I believe that there are fundamental issues with the way EMC sells Atmos to customers. First of all, if Atmos is cloud storage, then it should be sold on a usage basis. Customers should be charged only for what they use--not for petabytes of capacity up front. After all, isn't that the whole premise of cloud? Lowering your capital expenditures and shifting to a utility model? It makes me wonder if EMC is slowly becoming the Amdahl of Cloud Storage.

Intelligence Sources From Unlikely Places

October 06, 2010 09:30 AM
No matter how hard we try to protect our networks, there is always the chance something will go awry. From hackers breaking into our mail servers to laptops infected with malware, we must watch for issues and get help where we can. Most of us have our traditional tools in place to watch for issues from the desktop to the servers: log analysis tools, IDS, AV reporting, and anything else we can possibly gather information from to help us fight threats and know what has burrowed into our infrastructures. Now content and ISPs are getting into the game for free.

FireID Extends Google Two-Factor Authentication

October 04, 2010 09:32 AM
FireID has seamlessly integrated support for Google's recently released two-factor authentication offering into the FireID mobile security solution - extending the Google offering to a broader range of mobile platforms, The FireID solution means that businesses can have the functionality of Google's two-factor security on a wide variety of phones and platforms beyond the BlackBerry, iPhone, and Android devices supported by Google, a capability that affords the enterprise low long-term costs around maintenance and support and an end-to-end enterprise authentication solution.

« Previous Page  | 1 | 2 | 3 |  4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers