In depth NBA: Your last line of defense Network Behavior Analysis tools fill the void left by static security products such as firewalls, which simply enforce pre-existing policies, and intrusion-detection/prevention systems, which detect and block attacks based on known signatures. Five ways to improve storage power efficiency Anyone responsible for managing a data center understands the increasing importance of power efficiency. This is especially the case in data centers where consolidation and higher-density equipment has packed more and more devices into less floor space. Network World Community Jamey Heary looks at the five coolest security features and products released by Cisco this year. Brad Reese declares: Cisco enterprise wireless market share receives thrashing from Nortel. Wendell Odom looks at the road to the lab exam. Michael Morris considers the network design process. Eoghan says as important as certifications are, even better would be if management finally told know-it-all users to butt out. Users debate the strange case of Microsoft and the potty-mouthed Santabot. Scunnerous wonders when IT folks will finally acknowledge that laptops are corporate security liabilities. Tuomoks says don't underestimate IBM when it comes to security efforts. PacketCop wonders about network coding. MattR wonders why deploying a server takes so long. Miles Baska re-tries the Carbonite backup service; explains why he still prefers rival Mozy. Dave cautions about multimedia files on a low-end NAS device. Mitchell Ashley examines Microsoft's Volta effort to turn monolithic .Net apps into true client/server apps. Kerrie Meyler compares OpsMgr 2007 security and MOM 2005 security. Colin Spence compares the pros and cons of lists vs. document libraries. Adam Gaffin wonders if enterprise bloggers and users are too sexy for one blogger. Paul McNamara rounds up criticism of a blogging council started by big software and media concerns. Tyson Kopczynski spends an evening on the Google Space Station. James Gaskin cautions about free airport Wi-Fi. When it comes to wireless, think ROI, not cost, Craig Mathias says. Greg Royal writes that Amazon is setting a fire under mobile apps. Google Gal asks: Is Google evil? Patrick Regan explains what it takes to get a good job. From Microsoft Subnet: Hot discussions among Network World readers The top 5 coolest security features/products released this year by Cisco. Plus, Carbonite, Revisited; Open source software package takes aim at high-cost math programs; Microsoft pulls plug on potty-mouth Santa. Review Who's got the fastest firewall? As a follow-up to Network World's previous rounds of baseline Unified Threat Management testing, we conducted a second high-speed test of only the firewalls shipping within the UTM boxes. These subsequent firewall tests showed that when pushed to speed over 2 Gbps, the top raw performers were Crossbeam and IBM but when cost is factored in, Juniper's lower end box and Watchguard's FireBox provide the best firewall price performance punch How to Ron Nutter helps a user roll his own NAS. More news Microsoft's network coding plan An advanced technology called network coding is hidden away in the labs at some vendors as they figure out what to do with it. But Microsoft already has a working network coding prototype. Its Microsoft Secure Content Distribution (MSCD) system was trialed recently by customers to download a new release of Microsoft Visual Studio 2008 Beta-2. A virtual hit for MLB Advanced Media From pitch-by-pitch accounts of games to streaming audio and video -- plus news, schedules, statistics and more -- MLB Advanced Media has baseball covered. Strategic use of virtualization technology promises to smooth the company's shift to a new data center in Chicago in time for the 2008 season. Gannett's virtualization veteran lets us pick his brains To help it keep up with demand without breaking the bank, in 2002 Gannett Co. began exploring virtualization technology. Today the company has well over 1,000 virtual machines running on more than 50 VMware hosts. Cisco spins out another corporate security architecture Cisco unveils another security architecture, this one for role-based access. IBM's security stance: underrated or overambitious? IBM isn't known as a security company - even though it bought Internet Security Systems a year ago - but claims it's trying to become a dominant player in the network security market. Will Big Blue succeed? Carriers mobilize for $24B in military telecom contracts It's the high-tech spoils of war: The U.S. military plans to award telecommunications contracts worth as much as $24 billion, and the top-tier carriers are signing up to get a piece of the action. |
No comments:
Post a Comment