Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "HIPAA"

Total Search Results : 40

University Taps Dark Fiber for Online Academics, Healthcare

March 22, 2013 12:02 PM
Texas Tech University Health Sciences Center turns to a new network architecture and dark fiber to support the academic and healthcare needs of dozens of regional campuses and clinics.

Toward More Reliable Wireless With AirMagnet Enterprise 10

February 27, 2012 04:40 PM
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.

Cisco & Friends Debate Cloud Future

February 17, 2012 09:00 AM
Cloud computing is evolving to the point where unique clouds will be developed for specific industry verticals, such as healthcare, government and financial services, predicts a Cisco Systems executive speaking at the CloudConnect 2012 conference this week in Silicon Valley. This runs contrary to what some have called the Coke versus Pepsi rule--that companies would not want to be in multitenant cloud environments with their competitors.

Easing Some Of Virtual Security's Complexities

February 06, 2012 01:00 PM
Virtualization and cloud computing pretty much dominate the IT world, but security and compliance with IT standards are neither trivial concerns nor going away any time soon. But in some ways, security is easier to accomplish in virtual systems than in physical ones.

When To Encrypt At Layer 2 Or Layer 3

August 31, 2010 09:24 AM
Layer 2--data link layer--encryption is a high-performance security option that offers some advantages over Layer 3--networking layer--encryption in some scenarios, particularly in unified communications environments that require low-latency, high-volume data transmission. The increased availability and popularity of high-speed carrier Ethernet services provide fast, relatively cheap transmission, particularly for voice, video and other latency sensitive traffic. Enterprises can leverage more traditional Layer 3 IPSec encryption utilizing high-speed switching technology and fast pipes. Or, they can look at Layer 2 encryption technology, which is faster and simple to manage, for appropriate situations.

Healthcare Organizations Pressed By HITECH, HIPAA Security Pressures

February 17, 2010 01:00 PM
The flurry of activity around security in the health care industry is largely a product of the HITECH (Health Information Technology for Economic and Clinical Health) Act, passed as part of the Obama administration's stimulus package passed a year ago. The act takes a carrot-and-stick approach to spur the conversion of all patient information to electronic health records. The federal government is offering $19.2 billion in incentives to organizations that meet its requirements, starting in 2011. On the other hand, the act provides penalties for non-compliance starting in 2015 and stiffer penalties for violating HIPAA, which has been largely unenforced.

How To Assess Offshore Data Security

May 31, 2008 04:00 AM
Secure offshore outsourcing takes similar strategic thinking as in-house work.

Laptop Stolen With Personal Data On 300,000 Health Insurance Clients

January 30, 2008 08:00 PM
Horizon Blue Cross Blue Shield of New Jersey is offering its members free credit monitoring for one year as a result of the security breach.

Analysis: Enterprise Search

June 22, 2007 04:00 AM
New search appliances claim to be uniquely adapted to meet enterprise needs. We tested eight enterprise search products and analyzed the technology's security and architectural implications. Our take: The

Cisco's IronPort Acquisition: A 2-for-1 Deal

February 01, 2007 05:00 AM
Cisco taps into two markets--antispam and messaging compliance--with one $830-million acquisition.

 1 | 2 | 3 | 4  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers