ConSentry is introducing a new product that incorporates its network access control hardware and software into an Ethernet switch, making it possible to enforce access policies on a port-by-port basis.
Sun's recent move to promote Linux use on its UltraSparc architecture for servers may be a strategic play to keep the vendor's hardware line selling, but it could also be a more tactical or short-term move for users looking to build an enterprise data center platform.
We recently had a chance to talk about the support systems integrators, consultants and value-added resellers provide unified communications deployments, with Steve McDonald, enterprise architect and co-director for the unified communications practice at Optimus Solutions. Optimus provides systems designed to streamline business processes and improve communication in the workplace. The company's 170 employees offer a range of integration and consulting services, as well as hardware, software and storage pr
It has been a while since I’ve highlighted a report from The Tolly Group, which many readers found useful. Tolly recently evaluated Nortel’s Terabit Cluster Solution, which the testing firm describes as a combination of resilient hardware and software in Nortel’s Ethernet Routing Switch 8600.
In cases of suspected embezzlement via software, I think we have to seize the working system, not only make bitwise copies of the data but also create a clone of the entire system using hardware that's as close to the original as possible, and then exercise the clone under tight observation using known inputs as if we were conducting a thoroughgoing software quality assurance inspection.
ShoreTel earlier this week announced several software and hardware upgrades and two new voice switches. Included in the announcement are enhancements to the ShoreWare Call Manager product line, more open interfaces for integration, and adds two new voice switches: the ShoreGear 24A and the ShoreGear 30.
A change to the licensing agreement for Apple’s OS X Leopard Server operating system software will allow users to run virtual machines on Apple hardware. Before Mac OS X Leopard shipped, the license agreement for Apple’s server software did not permit virtualization.
Keeping track of the changing threat and vulnerability picture is a challenge for any security or network administration team. Threats change because of the constant efforts of Bad Actors who actively seek to exploit known vulnerabilities and to discover new ones. Vulnerabilities change because of changes in software versions, installation of new hardware or new firmware, installation of new software patches, and changes in network topology.
I remember when some Cisco executives positioned the company as a software vendor, not a hardware vendor - its R&D focused a lot more on IOS and other software than the networking hardware surrounding it. And to a large degree for better, and in some ways for worse (as constant updates could drive networking planners crazy), the software inside Cisco's networking devices has been a product and brand definer. However, I don't believe that anyone in the broader market assumed that Cisco was fundamentally in
I remember when some Cisco executives positioned the company as a software vendor, not a hardware vendor - its R&D focused a lot more on IOS and other software than the networking hardware surrounding it. And to a large degree for better, and in some ways for worse (as constant updates could drive networking planners crazy), the software inside Cisco's networking devices has been a product and brand definer. However, I don't believe that anyone in the broader market assumed that Cisco was fundamentally in
Ruby on Rails programmers will want to take note of this newsletter: The company that oversees development of the coding language is warning of "serious" flaws in the system, which could be exploited to take over systems. Also, the major VOIP hardware vendors are issuing patches for a number of common flaws in their respective systems. And, Adobe has patched Acrobat to fix a flaw that could be used to take over an non-patched system.
The purpose of utility computing is to provide services to the user base when those services are needed (hence, the other generally used term for utility computing - "on-demand"). Costs for the hardware, management, infrastructure and other assets are shared across the various user groups, and when it comes to actually paying for the storage you use - as in the case with most utilities - you pay as you go.
Elko Group, one of Eastern Europe's biggest wholesalers of computer hardware and peripherals, is riding a wave of demand for its products spurred by rapid economic growth in its nine-country region.
Google is working with hardware makers so TVs, smartphones and PCs can play 4K content from YouTube and other streaming services while consuming almost half the bandwidth required by high-definition videos today.
WatchGuard this week is introducing a hardware platform called Firebox X Peak as well as a new operating system for all its X family of IPSec VPN/firewall appliances.
Not so long ago, HP made public its ambitious plan to become a leading software provider. With chief Mark Hurd at the helm, the company known for making most of its money via hardware and other products declared it would speed to the top of the software market as well. And recent earnings announcements show HP's efforts could help it achieve this goal and s쳮d financially despite tough economic times.
Canonical Ltd., the company that supports Ubuntu Linux, is trying to work out a deal with hardware vendors such as Dell Inc. to make Ubuntu available preinstalled on servers.
Service provider Savvis this week plans to announce a managed service that offers a variety of security features without requiring hardware or software at a customer's location.
Service provider Savvis this week plans to announce a managed service that offers a variety of security features without requiring hardware or software at a customer's location.
Service provider Savvis this week plans to announce a managed service that offers a variety of security features without requiring hardware or software at a customer's location.