Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
Identity and Access Management: A New, Less Excruciating Approach
January 10, 2012
As essential as open systems and mobile applications are for doing business, they also put significant strain on an organization's security systems and, in particular, the key line of defense: identity and access management systems.
Virtualization Meets City Hall
January 09, 2012
The city of Fairfield, Calif.'s IT organization has leveraged virtualization and cloud-delivered applications to provide new levels of service in an increasingly efficient manner. Fairfield, a mid-sized city of 110,000 in Northern California, has taken the do-more-with-less adage to its fullest, beginning interestingly with core and mission-critical city services applications.
One Year Later: MS Exchange Practices Most Companies Should Still Shun
January 04, 2012
Over a year ago, we presented a list of the top 10 worst practices that you should avoid if you want to maintain the performance and uptime of your Microsoft Exchange email system. Since then, some things have changed, while others have not. So here's a revised Top 10 List of "Don'ts" to point out which practices still hold true and which do not.
The Scalable, Available Cloud
December 27, 2011
With the evolution and proliferation of cloud computing, as more and more applications are being migrated to the cloud, many organizations are considering moving their database to the cloud as well. Two main concerns on users' minds are database scalability and availability.
The Sky-High Expectations Surrounding Mobile Networks
December 19, 2011
We hear about the post-PC era, but rarely does anyone talk about the post-LAN or even the post-WAN era. Yet the major IT trends of the day -- from mobile to cloud to app stores -- are changing the expectations we all have from our blended networks. How are the campus networks of yesterday going to support the Internet-borne applications and media delivery requirements of tomorrow?
The Evolution of Online Data Access: Keeping It Secure
December 12, 2011
Access to data has never been easier than it is today. With a few easy steps, it's possible to uncover just about any type of information you can imagine, even data that is supposedly legally protected, such as personal, financial, healthcare and government records.
A Real-World Approach to Improving Security in the Cloud
November 14, 2011
Everybody knows that the cloud -- in particular, the security of cloud deployments -- is a huge pain point industry-wide. And as is the case with any new endeavor with such broad-sweeping impact, there's no shortage of well-meaning advice about how to secure it. But I confess to finding much of that advice about cloud security somewhat frustrating.
Data Integration in the Cloud - or Not
November 11, 2011
Data integration is critical for companies that need to combine systems and databases after a merger or acquisition, or need to link legacy systems to new business applications. This need is vast throughout commercial and public industries, and the task can be daunting, especially for CIOs and IT managers of small- to medium-sized businesses.
Avoiding a Crash When the Holiday Hordes Attack
November 08, 2011
The countdown to Cyber Monday has begun. Is your online business ready for the holiday shopping spree? We're all too familiar with sluggish online shopping experiences that have left us frustrated or caused us to leave the site altogether before we've completed a transaction. As the holiday shopping season looms, businesses can't afford to have their websites slow down, or worse yet, taken down by traffic overload.
The Cybersecurity Money Pit
November 08, 2011
Despite the hundreds of millions of dollars the U.S. federal government spends on cybersecurity, it seems that shoestring-budget attackers are still often able to get a foot in the door. At a security colloquium in North Virginia on Monday, the Defense Advanced Research Projects Agency told reporters it's losing ground in the battle to secure cyberspace.
New 'Server on a Chip' Aims to Lighten Up Cloud Hardware
November 02, 2011
While the image that the high-tech industry has adopted for the source of services delivered over a remote network -- the cloud -- conjures thoughts of airy skies where quasi-magical things happen, the actual cloud is firmly anchored to the ground in data centers bristling with computer servers. As the cloud continues to expand, so does the demand for servers.
Facebook to Build Massive Arctic Data Fortress
October 27, 2011
Facebook is planning to build a massive new data center in the industrial town of Lulea in Swedish Lapland, about 70 miles from the Arctic Circle. The data center will consist of three buildings, the first of which will cover about 33,000 square yards, Facebook spokesperson Alex Kirschner told TechNewsWorld.
Microsoft Adds Firepower to Dynamics CRM
October 25, 2011
Microsoft is rolling out a service update for Microsoft Dynamics CRM Online for both the partner-hosted and on-premises deployments. The update includes its promised "Activity Feeds," as well as administrative enhancements and stepped-up disaster recovery practices. Microsoft has put Dynamics CRM on a rapid release schedule, said Brad Wilson, general manager of Microsoft Dynamics CRM.
Federal CIO Steps Up Data-Consolidation Pressure
October 25, 2011
The potential for saving money through data center consolidation among federal agencies is so great that the newly installed federal chief information officer has now challenged information technology managers to move further and faster to implement the Federal Data Center Consolidation Initiative.
The Future Enterprise, Part 3: Technology Designed to Fit the Job
October 15, 2011
Not all computing tasks are created equal, and the same goes for computing systems. Corporations and other organizations will be best served by systems that are designed to perform particular jobs or are flexible enough to adapt to them -- one of the core principles of engineering. In techie jargon, these are "workload optimized systems."
Enterprise Security System Puts Android Under Lock and Key
October 12, 2011
The proliferation of smartphones has created headaches for security-minded IT departments everywhere, but a Motorola subsidiary aims to give system administrators more peace of mind with a solution for managing Android phones in business environments. Three Laws Mobility, purchased by Motorola eight months ago, announced Tuesday that its management solution for Android phones is now ready for prime time.
VDI Planning Guide: Highly Available Desktops
October 05, 2011
A key advantage of virtualization is the ability to decouple an operating system from its hardware layer. This improves flexibility and maximizes uptime. Virtual server infrastructure commonly utilizes this flexibility to provide high availability, moving virtual servers between hosts.
Next-Gen Firewalls Make Old Arguments New Again
September 28, 2011
The last few years have brought us arguably the most significant change in firewall technology in decades. Ever since "stateful inspection" was introduced by Check Point in the late 1990s, firewall administrators and information security officers have been defining security policies based primarily on a connection's source IP address, destination IP address and service.
Wrapping Personal Devices and Critical Data in Stale Policies
September 21, 2011
It's a myth that ostriches bury their heads when they spot danger. It sounds plausible, but in reality, they're just like us: In the face of imminent danger, they either run or attack. This makes sense when you stop to think about it. After all, one thing that seems almost painfully obvious is that ignoring signs of danger isn't an effective defense strategy.
Singing in the Rain: How the Cloud Can Pour Down Money
September 12, 2011
Today's consensus is no longer around an "if" for cloud computing, but the "when" and what types of cloud models are best suited for any particular company. The present challenge, then, is about the proper transitions to leveraging cloud for improved IT and for far better business results. At VMworld, as part of the main keynote address, one company and its design and implementation of a private cloud rose above the rest.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS