Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
How Secure Is the Cloud, Really?
August 28, 2012
Cloud security skeptics were given yet another reason to doubt the fortitude of online storage when the strange tale of Mat Honan emerged earlier this month. Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life.
DeepField Maps the Intricacies of the Cloud
July 31, 2012
The cloud -- as in, the offsite storage of data -- is becoming as vast and ever-changing as clouds in the sky, but DeepField Networks announced an analytics tool that could allow the flow of cloud-based data to be mapped. This would include tracking traffic patterns, application performance and cost structure of networks for cloud computing companies as well as content providers and carriers.
Memo to Twitter: Failure Is No Longer Amusing
July 27, 2012
Twitter is back in action after a data center failure caused worldwide outages for many of its users Thursday. Starting around 8:30 a.m. PT, Twitter users who tried to access the site were greeted with a partially coded message that read, "Twitter is currently down."
A New Day for ID Management
July 23, 2012
Let's examine the relationship between controlled digital identities in cyber risk management. Our panel will explore how the technical and legal support of ID management best practices have been advancing rapidly. And we'll see how individuals and organizations can better protect themselves through better understanding and managing of their online identities.
Making IT Problems Solve Themselves
July 09, 2012
IT must do whatever it takes to make businesses lean, agile and intelligent. Modern support services, then, also need to be able to empower workers and IT personnel to maintain peak control of systems and to keep the applications, data and processes performing reliably at lowest cost.
Now You See It, Now You Don't: The Challenges of a Disappearing Network Perimeter
July 06, 2012
It may seem like Houdini is inside the network, because the perimeter as we have known it is disappearing. Conceptually, firewalls used to sit between the public Internet and the internal network with its servers, desktops and applications. There was a clear network perimeter separating internal resources from the outside world.
Twitter's Not Singing About Outage Details
June 22, 2012
Twitter was unavailable to users for significant portions of the day on Thursday. Contrary to speculation, it wasn't due to a hack attack, despite attempts by some groups to claim responsibility. Rather, a "cascading bug" in one of its infrastructure components was the cause for the upheaval, Twitter said.
Process Maturity and the Fine Art of Control
June 19, 2012
If you're in IT and your job involves securing your organizations' infrastructure, you've probably spent a good deal of time thinking through control selection -- in other words, picking the controls that most directly help you accomplish the goal of securing your environment.
Data Management: The Next Generation
June 11, 2012
Businesses clearly need a better approach to their data recovery capabilities -- across both their physical and virtualized environments. The current landscape for data management, backup and disaster recovery too often ignores the transition from physical to virtualized environments and sidesteps the heightened real-time role that data now plays in the enterprise.
3 Database Bugaboos Facing Platform as a Service
June 01, 2012
Platform as a Service solutions for the cloud are continuing to pop up all over in the world of software due to their simplicity, efficiency and strong developer orientation. Several different PaaS platforms are being built for specific technology stacks. At the application level, most PaaS solutions provide a suitable way to scale the application to deal with fluctuating demand or changing needs.
Isolated Systems Need Love Too
May 22, 2012
Information security has changed a lot over the years. Way back in the dinosaur days, life was simple. Companies set up a firewall at the border and life was good. Bad guys stayed on one side of the fancy flashing box, and our personnel lived in the pristine, attacker-free paradise on the inside. Well, that's how it was supposed to work, at least. Over the years, the model changed.
Disaster Recovery: It's Not Just for Catastrophes Anymore
April 30, 2012
Business standards and compliance services provider SAI Global is benefiting from a strategic view of IT-enabled disaster recovery. SAI Global has brought advanced backup and DR best practices into play for its users and customers. This has not only provided business continuity assurance, but it has also provided beneficial data lifecycle management and virtualization efficiency improvement.
The Lighter Side of IT Consumerization
April 24, 2012
You've probably heard the term "consumerization of IT." Some of the network and security pros reading this probably think this is yet another meaningless industry buzzword with little or no value. However, to dismiss it as such is to potentially miss out on what is both a very powerful concept ... and one that information security practitioners ignore at their peril.
Disaster Recovery: Learning From Painful Experience
April 23, 2012
When Hurricane Ike struck Texas in 2008, it became the second-costliest hurricane ever to make landfall in the U.S. It was also a wake-up call for Houston-based insurance wholesaler Myron Steves & Co., which was not struck directly but nonetheless realized its IT disaster recovery approach was woefully inadequate.
Federal Agencies Struggle With Protecting IT Supply Chain
April 03, 2012
Managers of information technology systems in both the private and public sectors have had their hands full dealing with security breaches that come from hackers invading IT systems. Increasingly, however, IT systems are becoming vulnerable from another channel -- the actual supply chain sources of both hardware equipment and software programs. Federal agencies are just as vulnerable as commercial enterprises to supply chain security breaches.
Building a Private-Cloud Home for Complex Ops
April 02, 2012
Worldwide enterprise applications leader SAP has designed and implemented a private cloud infrastructure model that supports an internal consulting and training program. By standardizing on a VMware cloud platform, SAP has been able to slash provisioning times for multiple instances of its flagship application suite in the training setting, as well as set the stage for wider adoption of cloud models.
The Proper Care and Feeding of Highly Virtualized Environments
March 26, 2012
Advanced and pervasive virtualization and cloud computing trends are driving the need for a better, holistic approach to IT support and remediation. And while the technology to support and fix virtualized environments is essential, it's the people, skills and knowledge to manage these systems that provide the most decisive determinants of ongoing performance success.
Iceland Has the Hots for FOSS
March 26, 2012
The government of Iceland recently launched a one-year migration project for all its public institutions in what appears to be an acceleration of its movement toward free and open source software and away from proprietary systems. The project will apparently lay the foundation for the migration with a common infrastructure.
Does Your IaaS Environment Have Sleeper Cells?
March 21, 2012
As many active users of IaaS can tell you, IaaS, whether implemented by an external service provider or provided by an internal service provider team, arguably grants you much more control of the underlying technology "substrate" than other cloud deployment models. In some cases, this is a good thing.
The Software Distribution Generation Gap
March 19, 2012
There's a huge productivity gap between modern software and the aging manner in which most enterprises still distribute and manage applications on personal computers. At a time when business models and whole industries are being upended by improved use of software, IT providers inside of enterprises are still painstakingly provisioning and maintaining PC applications in much the same way they did in the 1990s.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS