Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "privacy"

Total Search Results : 68

NSA PRISM Violates Rights, Fails to Protect, Say Readers

June 14, 2013 09:35 AM
Revelations about NSA’s PRISM program and the collection of phone records have sparked debate about data gathering and government surveillance. Network Computing’s readers weigh in.

Google's Wireless Sensors: Big Data or Big Brother?

May 22, 2013 12:32 PM
Google demonstrated a network of wireless environmental sensors at its I/O conference last week. These sensors, combined with projects like Google Glass, expose the potential for the use and misuse of relentless data collection.

RSA Chief Tells Enterprises: Make Security And Privacy Protection Top Priorities

February 29, 2012 11:00 AM
While RSA, EMC's security division, has acknowledged it has a lot of work to do to repair its reputation after the 2011 hack attack that exposed information on 77 million customer accounts, the company says a new study shows a troubling lack of attention to security and privacy risks among directors and top executives at Global 2000 companies. Presented at the RSA Conference 2012 in San Francisco, the study calls for companies to "establish a tone from the top" to make security and privacy protection top priorities.

Rise Of HTML5 Brings With It Security Risks

January 24, 2012 08:30 AM
HTML5 is the new "it" protocol on the Internet. Among other things, it is an alternative to Adobe's Flash for displaying content through a Web browser. No less an industry authority than the late Steve Jobs declared in 2010 that browsers on Apple devices such as the iPad would support HTML5 and not Flash. But as HTML5 gains wider adoption, some of its security flaws are beginning to get noticed, including the WebSocket specification that renders Web pages more quickly than does Flash.

Transferring DNS Registrars Not A Problem

December 29, 2011 01:28 PM
It's Dec. 29, and I have started to transfer personal DNS domains from GoDaddy. The company's position on SOPA (Stop Online Piracy Act)—its reversal notwithstanding—was the nudge that pushed me over the edge. Frankly, GoDaddy has been acting poorly during the last few years, and I decided to move my domains elsewhere. So far, the transfers have gone well, with nary a hiccup.

No Data Privacy In The Cloud

July 01, 2011 11:08 AM
Most people understand that data in the cloud won’t have the same level of security and privacy that data inside your corporate firewall has. But some recent news has shown just how insecure your cloud-based data really is.

Should An Expectation Of Employee Privacy Exist?

January 08, 2010 01:00 PM
Continuing our previous discussion on U.S. Supreme Court case on a data privacy issue related to whether or not an employee has a reasonable expectation of privacy for personal messages sent on devices owned by an employer, we have to ask, does it matter that employees know that personal information will be captured and monitored by employers?

7 Whole-Disk Encryption Apps Put A Lock On Data

March 28, 2008 08:00 AM
TruCrypt, PGP, FreeOTFE, BitLocker, DriveCrypt, and 7-Zip provide remarkably strong, on-the-fly, encryption to keep your data secure from loss, theft, or prying eyes.

Forensics: New Options for the Enterprise

October 15, 2007 04:00 AM
Unsure about bringing forensics in-house? New tools make life easier for corporate security investigators and legal counsel.

IT Security: The Data Theft Time Bomb

July 14, 2007 04:02 AM
While viruses and worms remain the most pesky security problems, data theft concerns simmer beneath the surface, according to InformationWeek's 10th annual Global Information Security survey.

 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers