OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
The Scalable, Available Cloud
December 27, 2011
With the evolution and proliferation of cloud computing, as more and more applications are being migrated to the cloud, many organizations are considering moving their database to the cloud as well. Two main concerns on users' minds are database scalability and availability.
The Sky-High Expectations Surrounding Mobile Networks
December 19, 2011
We hear about the post-PC era, but rarely does anyone talk about the post-LAN or even the post-WAN era. Yet the major IT trends of the day -- from mobile to cloud to app stores -- are changing the expectations we all have from our blended networks. How are the campus networks of yesterday going to support the Internet-borne applications and media delivery requirements of tomorrow?
The Evolution of Online Data Access: Keeping It Secure
December 12, 2011
Access to data has never been easier than it is today. With a few easy steps, it's possible to uncover just about any type of information you can imagine, even data that is supposedly legally protected, such as personal, financial, healthcare and government records.
A Real-World Approach to Improving Security in the Cloud
November 14, 2011
Everybody knows that the cloud -- in particular, the security of cloud deployments -- is a huge pain point industry-wide. And as is the case with any new endeavor with such broad-sweeping impact, there's no shortage of well-meaning advice about how to secure it. But I confess to finding much of that advice about cloud security somewhat frustrating.
Data Integration in the Cloud - or Not
November 11, 2011
Data integration is critical for companies that need to combine systems and databases after a merger or acquisition, or need to link legacy systems to new business applications. This need is vast throughout commercial and public industries, and the task can be daunting, especially for CIOs and IT managers of small- to medium-sized businesses.
Avoiding a Crash When the Holiday Hordes Attack
November 08, 2011
The countdown to Cyber Monday has begun. Is your online business ready for the holiday shopping spree? We're all too familiar with sluggish online shopping experiences that have left us frustrated or caused us to leave the site altogether before we've completed a transaction. As the holiday shopping season looms, businesses can't afford to have their websites slow down, or worse yet, taken down by traffic overload.
The Cybersecurity Money Pit
November 08, 2011
Despite the hundreds of millions of dollars the U.S. federal government spends on cybersecurity, it seems that shoestring-budget attackers are still often able to get a foot in the door. At a security colloquium in North Virginia on Monday, the Defense Advanced Research Projects Agency told reporters it's losing ground in the battle to secure cyberspace.
New 'Server on a Chip' Aims to Lighten Up Cloud Hardware
November 02, 2011
While the image that the high-tech industry has adopted for the source of services delivered over a remote network -- the cloud -- conjures thoughts of airy skies where quasi-magical things happen, the actual cloud is firmly anchored to the ground in data centers bristling with computer servers. As the cloud continues to expand, so does the demand for servers.
Facebook to Build Massive Arctic Data Fortress
October 27, 2011
Facebook is planning to build a massive new data center in the industrial town of Lulea in Swedish Lapland, about 70 miles from the Arctic Circle. The data center will consist of three buildings, the first of which will cover about 33,000 square yards, Facebook spokesperson Alex Kirschner told TechNewsWorld.
Microsoft Adds Firepower to Dynamics CRM
October 25, 2011
Microsoft is rolling out a service update for Microsoft Dynamics CRM Online for both the partner-hosted and on-premises deployments. The update includes its promised "Activity Feeds," as well as administrative enhancements and stepped-up disaster recovery practices. Microsoft has put Dynamics CRM on a rapid release schedule, said Brad Wilson, general manager of Microsoft Dynamics CRM.
Federal CIO Steps Up Data-Consolidation Pressure
October 25, 2011
The potential for saving money through data center consolidation among federal agencies is so great that the newly installed federal chief information officer has now challenged information technology managers to move further and faster to implement the Federal Data Center Consolidation Initiative.
The Future Enterprise, Part 3: Technology Designed to Fit the Job
October 15, 2011
Not all computing tasks are created equal, and the same goes for computing systems. Corporations and other organizations will be best served by systems that are designed to perform particular jobs or are flexible enough to adapt to them -- one of the core principles of engineering. In techie jargon, these are "workload optimized systems."
Enterprise Security System Puts Android Under Lock and Key
October 12, 2011
The proliferation of smartphones has created headaches for security-minded IT departments everywhere, but a Motorola subsidiary aims to give system administrators more peace of mind with a solution for managing Android phones in business environments. Three Laws Mobility, purchased by Motorola eight months ago, announced Tuesday that its management solution for Android phones is now ready for prime time.
VDI Planning Guide: Highly Available Desktops
October 05, 2011
A key advantage of virtualization is the ability to decouple an operating system from its hardware layer. This improves flexibility and maximizes uptime. Virtual server infrastructure commonly utilizes this flexibility to provide high availability, moving virtual servers between hosts.
Next-Gen Firewalls Make Old Arguments New Again
September 28, 2011
The last few years have brought us arguably the most significant change in firewall technology in decades. Ever since "stateful inspection" was introduced by Check Point in the late 1990s, firewall administrators and information security officers have been defining security policies based primarily on a connection's source IP address, destination IP address and service.
Wrapping Personal Devices and Critical Data in Stale Policies
September 21, 2011
It's a myth that ostriches bury their heads when they spot danger. It sounds plausible, but in reality, they're just like us: In the face of imminent danger, they either run or attack. This makes sense when you stop to think about it. After all, one thing that seems almost painfully obvious is that ignoring signs of danger isn't an effective defense strategy.
Singing in the Rain: How the Cloud Can Pour Down Money
September 12, 2011
Today's consensus is no longer around an "if" for cloud computing, but the "when" and what types of cloud models are best suited for any particular company. The present challenge, then, is about the proper transitions to leveraging cloud for improved IT and for far better business results. At VMworld, as part of the main keynote address, one company and its design and implementation of a private cloud rose above the rest.
The Automation Revelation
August 29, 2011
A UK-based managed service provider is on a journey to provide better information and services for its network, voice, VoIP, data and storage customers. The network management and productivity benefits have come from an alignment of many service management products into an automated lifecycle approach to overall network operations.
Federal CIO Prods Agencies to Revamp Websites
August 23, 2011
The U.S. government's new CIO wasted little time in directing federal agencies to significantly improve the way they manage information technology resources. Steven VanRoekel, who took over the federal CIO post on Aug. 4, quickly issued a directive designed to push agencies to meet an Obama administration goal for operating federal websites more efficiently.
A Standard Is Born
August 15, 2011
The Open Automated Compliance Expert Markup Language is a new standard that helps enterprises automate security compliance across their systems in a consistent and cost-saving manner. O-ACEML helps to achieve compliance with applicable regulations but also achieves major cost savings. From the compliance audit viewpoint, auditors can carry out similarly consistent and more capable audits in less time.
Social Menaces
August 11, 2011
In terms of online communication, social media is the biggest trend in recent years. There are billions of participants around the globe as well as an array of forms: blogs, forums, wikis, multimedia content, social bookmarking and, of course, popular platforms such as Facebook, Twitter and Google+. What's more, social media is strongly established as an important channel for companies to communicate with their customers.
Yes, You Really CAN Compete With the Public Cloud Provider
August 06, 2011
The prudent CIO sees the need for a quantum level improvement in the way IT delivers services and resources. To survive, IT must rapidly regain competitive strength by emulating the key strengths of external cloud suppliers. The internal IT delivery model has to change from a bureaucratic process that can take days or weeks, to one that supports self-service and makes resources immediately available.
US Cyberwarfare Policy Should Make Enterprises Sweat the Insider Threat
July 27, 2011
The recent spearphishing attacks on security firm RSA and on the International Monetary Fund are both suspected of being attacks by foreign powers to steal data that could be used in a cyberoffensive against the United States. In fact, the CIA website and the U.S. Senate were also breached by the hacking group LulzSec, and government contractors Lockheed Martin and Booz Allen Hamilton were attacked more recently.
Mythbusting the Private Cloud
July 25, 2011
The popularity of cloud concepts and the expected benefits from cloud computing have certainly raised expectations. Forrester now predicts that cloud spending will grow from $40 billion to $241 billion in the global IT market over the next 10 years, and yet, there's still a lot of confusion about the true payoffs and risks associated with cloud adoption.

See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS