Найденные страницы с тегом factor всего 8005

Five billionth device about to plug into Internet | Network World

Sometime this month, the 5 billionth device will plug into the Internet. And in 10 years, that number will grow by more than a factor of four, according to IMS Research, which tracks the installed base of equipment that can access the Internet.

Can behavioral biometrics help detect terrorists entering the U.S.? | Network World

Fingerprinting air passengers entering the United States is one counter-terrorism method used today . But the Department of Homeland Security (DHS) has another idea in the works: a behavioral biometrics monitoring system that gauges small changes in a person's body, d믭 the "fidget factor," especially in answer to a question such as "Do you intend to cause harm to America?"

UPDATE: RSA warns SecurID customers after company is hacked | Network World

EMC's RSA Security division says the security of the company's two-factor SecurID tokens could be at risk following a sophisticated cyber-attack on the company.

The start-up CFO | Network World

Start-ups as we know are notoriously risky ventures but they do tend to carry a factor that few large Top 20 companies offer: excitement and a genuine stake in both ownership and in the “making a difference factor”. In Silicon Valley where the mantra from venture capitalists is “we’ll give you the money but get your self a sharp CFO first”.

Apple Tablet: Screen Cost is Hurdle Apple Can’t Jump | Network World

As reports surfaced Monday that Apple's upcoming tablet may cost right around $1000, industry critics began debating the not-so-appetizing price. CIO.com talked to a touchscreen maker to get the inside scoop on one big factor keeping the tablet's price high: the display.

Brocade takes aim at Cisco with new Carrier Ethernet line | Network World

Brocade has launched a line of small form factor Carrier Ethernet routers designed to make Ethernet service delivery at the edge more cost and power efficient.

RSA’s SecurID security breach: What should you do? | Network World

RSA's disclosure last night that it has suffered a sophisticated cyberattack in which attackers obtained some type of information about RSA's SecurID product for two-factor authentication is prompting a variety of suggestions in how customers should deal with the problem.

NZ school ditches Microsoft and goes totally open source | Network World

A New Zealand high school running entirely on open source software has slashed its server requirements by a factor of almost 50, despite a government deal mandating the use of Microsoft software in all schools.

Token resistance | Network World

The need for strong authentication to protect online transactions and to comply with new regulations spawned a host of start-ups over the past couple of years offering exotic types of two-factor authentication.

Will Droid gain iPhone’s tech ‘lust’ factor? | Network World

Comparisons have already been made between the iPhone and the Droid smartphones, but one telling difference that might matter more is something less tangible, involving Apple fanaticism and the iPhone's two-year-plus market lead over the Droid.

Acer’s AspireRevo nettop taps Ion platform | Network World

Along with more than 20 new netbooks, notebooks, all-in-one PCs, Acer on Tuesday launched what it called the first small form factor PC to offer Nvidia's Ion platform, combining Intel's Atom chip and the Ion graphics processor.

How to Design a Successful RACI Project Plan | Network World

Having managed and rescued dozens of projects, and helped others do so, I've noted that there is always one critical success factor (CSF) that has either been effectively addressed or missed/messed up.

5 tips to audit and improve virtual server security | Network World

On the surface, security questions surrounding virtual servers don't seem much different than those for the physical machines on which they run. In fact, starting a virtual security audit by keeping in mind what you've already learned in the physical world is an excellent approach. Security analysts say the same practices, principles and basic common sense apply for a group of virtual servers as for any physical server farm. But, IT managers also need to factor in some additional considerations, due to the

Survey: Continuity Plans Factor in Mobile, Social Networking | Network World

Business continuity planning has evolved from simply something companies hope never to roll out, to an important focus of security operations, according to a new survey from AT&T.

Vyatta unveils open source appliance for SMBs | Network World

The Vyatta 514 is a networking appliance that combines the company's open-source routing and security software with a small form factor hardware platform. The product features integrated routing, firewall and VPN capabilities to connect small businesses and branch offices to the Internet or private networks.

Microsoft’s Vista SP1 hits manufacturing | Network World

The release of Vista SP1 to manufacturing may mean more adoption by corporate users, say some IT executives. IDC analyst Al Gillen says it's a small factor in implementation consideration. Users, many of whom expressed frustration that they have been waiting for this service pack for a while, can expect to see the service pack in mid-March or April.

RSA teams to bolster security for Apple, Google, RIM devices | Network World

RSA, the security division of EMC, today said it would collaborate with several mobile and virtualization platform vendors to integrate RSA two-factor authentication and risk-detection technologies.

RSA introduces the fourth-factor authentication | Network World

Burton Group analyst Mark Diodati pointed me to a paper presented last fall at the 13th ACM (Association for Computing Machinery) Conference on computer and communications security. It was written and presented by a group from RSA Labs and explored a fourth authentication method, one we all know and use but which hadn’t before been included in the traditional three methods: something you know, something you have, and something you are.

Seven strong authentication methods | Network World

As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of online security. These seven methods are those most often encountered in a financial services environment, but they would be useful (and adaptable) to just about any area where stronger authentication was needed. Here they are:

Users want systems for managing VoIP quality | Network World

According to the "2005/2006 VoIP State of the Market Report," published by Webtorials, when it comes to impediments to enterprise VoIP, security concerns remained the primary inhibiting factor, as cited by 42% of Webtorials users. The same percentage of respondents cited lack of systems for managing and troubleshooting VoIP quality as an impediment.

Chicago Mercantile Exchange sees benefits in automated change management | Network World

Last time, we discussed Network World’s recent IT Roadmap conference in Chicago. Network World President and Editorial Director John Gallant interviewed David Grooms, vice president and U.S. CIO of McDonalds. Grooms pointed out that McDonalds had recently made a major WAN upgrade with the driving factor being the business value that was associated with the upgrade, than the traditional financial metrics. Today, we are going to provide another example of an IT organization that makes at least some investm

Start-up proposes alternative to TCP | Network World

In all my musings on WAN optimization and application acceleration, one common factor remains: the networks in need of optimization tools and enhanced traffic speeds rely on TCP/IP as the transport protocol.

Your online reputation precedes you | Network World

Last spring we were talking about reputation as a component of identity (see "Reputation as the new currency of identity" and "Why reputation works as an identity management element"). Specifically, we discussed about how reputation can be used as a factor to determine the amount of reliance you place on claims made by, or on behalf of, an entity wishing to be authenticated or authorized. What we're talking about is a reputation for trustworthiness or reliability.

QoE in context with diagnostics: Some News from the trenches | Network World

One of my personal ongoing preoccupations – hopefully related to valid industry preoccupations – is Quality of Experience or QoE. This is at least in part logical. If the Configuration Management Database is the industry’s single most conspicuous hallmark of architectural innovation and multibrand solution integration, QoE is the hallmark of another equally telling factor in evolving the management industry: the growing awareness that technology is meant to serve a flesh-and-blood customer, not vice

Raptor packs more into single-mode fiber | Network World

Start-up Raptor Networks Technology this week said it was able to run Gigabit Ethernet bi-directionally through a small form-factor pluggable, or SFP, optical interface in a multilayer switch. The company also partnered with iStor Networks to build out its storage-area network offerings.