Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "data security"

Total Search Results : 46

Web Analytics Process the Data Vortex

July 30, 2004 05:00 AM
Web analytic products and services can help you process a deluge of raw site visitor data, revealing truths about customer behavior.

Vontu Protect Monitors Data Departures

May 21, 2004 04:00 AM
Keep track and alert admins when sensitive files leave the corporate network.

PC Blades: Poised To Take Off?

April 05, 2004 03:00 PM
When the Northwestern Memorial Physicians Group, had a system challenge, it turned to a technology that's starting to gain a foothold in enterprise data centers: PC blades.

Homeland Security CIO Outlines Priorities

March 29, 2004 03:00 PM
With 9/11 commission hearings, lingering tension over this month's train bombings in Madrid, Spain, and threats of retaliation against Israel and its allies for the recent assassination of Hamas founder and leader Sheikh Ahmed Yassin serving as the backdrop, Department...

Building Secure Enterprise WLANs

February 27, 2004 06:00 AM
Thanks to new and improved security standards and monitoring devices, you can finally build a WLAN that keeps data thieves at bay.

WLAN Security Monitors

February 27, 2004 06:00 AM
We put six WLAN security add-ons and three intergrated WLAN monitors through grueling tests in our Real-World labs. See which one rose to the challenge.

« Previous Page  | 1 | 2 | 3 | 4 |  5  

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers