OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
RIM Releases BYOD-Friendly IT Management Software
January 23, 2013
Research In Motion released a new version of its BlackBerry Enterprise Service mobile device management software on Wednesday. This comes just over a week before the official launch of the new BlackBerry 10 OS and compatible handsets, and just days after RIM CEO Thorsten Heins suggested the company might abandon the hardware market and sharpen its focus on software.
Akamai to Bring Smoother Video, App Performance to AT&T Network
December 07, 2012
Akamai is joining forces with AT&T to help the telecom carrier better deliver Web and entertainment content to mobile consumers. The two will team up over the next year, with AT&T folding much of Akamai's content delivery platform into its IP network. The system will be jointly marketed, managed and supported. The consolidation will allow AT&T to offer improved content delivery network services to its business customers.
Secure User Authentication: Might Makes Right
October 13, 2012
While the benefits of adopting Bring Your Own Device as your mobile policy are appealing -- from increased productivity to lower costs -- a BYOD policy can also leave your corporate network more vulnerable than ever. The breaches regularly featured in the news remind us that all networks, no matter how large or small, risk being exposed to unauthorized users every day.
Mobile Security: A Moving Target
October 02, 2012
The threat to enterprise security is increasing as the BYOD phenomenon gains ground in corporate America. The amount of Android malware out there has gone through the roof, and hackers are leveraging Twitter to create command and control servers for mobile botnets, according to McAfee's Q2, 2012 threats report. Existing approaches to security don't work well, and new solutions are required.
How Secure Is the Cloud, Really?
August 28, 2012
Cloud security skeptics were given yet another reason to doubt the fortitude of online storage when the strange tale of Mat Honan emerged earlier this month. Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life.
DeepField Maps the Intricacies of the Cloud
July 31, 2012
The cloud -- as in, the offsite storage of data -- is becoming as vast and ever-changing as clouds in the sky, but DeepField Networks announced an analytics tool that could allow the flow of cloud-based data to be mapped. This would include tracking traffic patterns, application performance and cost structure of networks for cloud computing companies as well as content providers and carriers.
Memo to Twitter: Failure Is No Longer Amusing
July 27, 2012
Twitter is back in action after a data center failure caused worldwide outages for many of its users Thursday. Starting around 8:30 a.m. PT, Twitter users who tried to access the site were greeted with a partially coded message that read, "Twitter is currently down."
A New Day for ID Management
July 23, 2012
Let's examine the relationship between controlled digital identities in cyber risk management. Our panel will explore how the technical and legal support of ID management best practices have been advancing rapidly. And we'll see how individuals and organizations can better protect themselves through better understanding and managing of their online identities.
Making IT Problems Solve Themselves
July 09, 2012
IT must do whatever it takes to make businesses lean, agile and intelligent. Modern support services, then, also need to be able to empower workers and IT personnel to maintain peak control of systems and to keep the applications, data and processes performing reliably at lowest cost.
Now You See It, Now You Don't: The Challenges of a Disappearing Network Perimeter
July 06, 2012
It may seem like Houdini is inside the network, because the perimeter as we have known it is disappearing. Conceptually, firewalls used to sit between the public Internet and the internal network with its servers, desktops and applications. There was a clear network perimeter separating internal resources from the outside world.
Twitter's Not Singing About Outage Details
June 22, 2012
Twitter was unavailable to users for significant portions of the day on Thursday. Contrary to speculation, it wasn't due to a hack attack, despite attempts by some groups to claim responsibility. Rather, a "cascading bug" in one of its infrastructure components was the cause for the upheaval, Twitter said.
Process Maturity and the Fine Art of Control
June 19, 2012
If you're in IT and your job involves securing your organizations' infrastructure, you've probably spent a good deal of time thinking through control selection -- in other words, picking the controls that most directly help you accomplish the goal of securing your environment.
Data Management: The Next Generation
June 11, 2012
Businesses clearly need a better approach to their data recovery capabilities -- across both their physical and virtualized environments. The current landscape for data management, backup and disaster recovery too often ignores the transition from physical to virtualized environments and sidesteps the heightened real-time role that data now plays in the enterprise.
3 Database Bugaboos Facing Platform as a Service
June 01, 2012
Platform as a Service solutions for the cloud are continuing to pop up all over in the world of software due to their simplicity, efficiency and strong developer orientation. Several different PaaS platforms are being built for specific technology stacks. At the application level, most PaaS solutions provide a suitable way to scale the application to deal with fluctuating demand or changing needs.
Isolated Systems Need Love Too
May 22, 2012
Information security has changed a lot over the years. Way back in the dinosaur days, life was simple. Companies set up a firewall at the border and life was good. Bad guys stayed on one side of the fancy flashing box, and our personnel lived in the pristine, attacker-free paradise on the inside. Well, that's how it was supposed to work, at least. Over the years, the model changed.
Disaster Recovery: It's Not Just for Catastrophes Anymore
April 30, 2012
Business standards and compliance services provider SAI Global is benefiting from a strategic view of IT-enabled disaster recovery. SAI Global has brought advanced backup and DR best practices into play for its users and customers. This has not only provided business continuity assurance, but it has also provided beneficial data lifecycle management and virtualization efficiency improvement.
The Lighter Side of IT Consumerization
April 24, 2012
You've probably heard the term "consumerization of IT." Some of the network and security pros reading this probably think this is yet another meaningless industry buzzword with little or no value. However, to dismiss it as such is to potentially miss out on what is both a very powerful concept ... and one that information security practitioners ignore at their peril.
Disaster Recovery: Learning From Painful Experience
April 23, 2012
When Hurricane Ike struck Texas in 2008, it became the second-costliest hurricane ever to make landfall in the U.S. It was also a wake-up call for Houston-based insurance wholesaler Myron Steves & Co., which was not struck directly but nonetheless realized its IT disaster recovery approach was woefully inadequate.
Federal Agencies Struggle With Protecting IT Supply Chain
April 03, 2012
Managers of information technology systems in both the private and public sectors have had their hands full dealing with security breaches that come from hackers invading IT systems. Increasingly, however, IT systems are becoming vulnerable from another channel -- the actual supply chain sources of both hardware equipment and software programs. Federal agencies are just as vulnerable as commercial enterprises to supply chain security breaches.
Building a Private-Cloud Home for Complex Ops
April 02, 2012
Worldwide enterprise applications leader SAP has designed and implemented a private cloud infrastructure model that supports an internal consulting and training program. By standardizing on a VMware cloud platform, SAP has been able to slash provisioning times for multiple instances of its flagship application suite in the training setting, as well as set the stage for wider adoption of cloud models.
The Proper Care and Feeding of Highly Virtualized Environments
March 26, 2012
Advanced and pervasive virtualization and cloud computing trends are driving the need for a better, holistic approach to IT support and remediation. And while the technology to support and fix virtualized environments is essential, it's the people, skills and knowledge to manage these systems that provide the most decisive determinants of ongoing performance success.
Iceland Has the Hots for FOSS
March 26, 2012
The government of Iceland recently launched a one-year migration project for all its public institutions in what appears to be an acceleration of its movement toward free and open source software and away from proprietary systems. The project will apparently lay the foundation for the migration with a common infrastructure.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS