Search Results | Network hardware
PREV 1...10   20   30...31   32   33   34   35   36   37   38   39   40...   50   60   70...111 NEXT
Sort by:  Most Relevant  |  Date
Duo shows off GSM-hacking technique at Black Hat DC

Blog  One of the more interesting presentations during the first day of the Black Hat DC conference on Wednesday was a demonstration of a cheap, quick method for capturing and decrypting calls made on the GSM cell phone network. Security researchers David Hulton and Steve Miller showed a standing-room onl...

Last updated: Feb 20, 2008   8:36 PM GMT  |  Blog: Security Bytes
Vocabulary: Does protean mean beginning, changeable or heroic?

Blog  Whatdoes this sentence mean? To satisfy the WebOps job description, an applicant must have a protean career history. a. The applicant would need to be just starting out. b. The applicant would need experience in many different jobs. c. The applicant would need to have demonstrated hero...

Last updated: Jun 17, 2014   2:51 PM GMT  |  Blog: Writing for Business   |      CIO
Sourcefire strengthens virtualization security with RNA

Blog   As attacks upon software systems become more sophisticated, it is crucial to adapt security measures to emerging threats. Virtualization is presently one of the most exciting technologies in the enterprise, but also among the most vulnerable. At VMworld, Sourcefire, the security company that br...

Last updated: Sep 16, 2008   7:06 PM GMT  |  Blog: Enterprise Linux Log
Ingram Micro snags Cisco GSA Schedule

Blog  U.S. public-sector partners that align with Ingram Micro now have access to Ciscos entire portfolio of technology products and solutions with the announcement today that Ingram Micro has added gained access to Ciscos General Services Administration (GSA) schedule. The expansion of its Cisco p...

Last updated: May 15, 2013   7:21 PM GMT  |  Blog: Channel Marker
Android Root

Blog  about 18 months ago I got my first and only Android phone. I chose the HTC Hero on the Sprint Network. I really do not have any complaints except that after the upgrade to 2.1 I heard that HTC and Sprint would not be allowing me to upgrade any further. I get it, the phone is Gen 1 hardware and the...

Last updated: Mar 24, 2011   7:00 AM GMT  |  Blog: The Multifunctioning DBA
Oracle launches telco OSS initiative

Blog  Oracle is launching a major telco OSS initiative based on conformance with the Telemanagement Forum (TMF) SID data model and architecture. The move is an evolution of Oracle's growing interest in the carrier market, but it also represents a key step in its competition with IBM and perhaps for the in...

Last updated: Nov 15, 2007   3:10 PM GMT  |  Blog: Uncommon Wisdom
Backups to disk across GB ethernet - what's your speed limit?

Answer  We don't have a SAN yet. We're trying to improve backup and disaster recovery time windows so we have been testing backups to disk using the following: Windows 2003 Server Dell PowerEdge server 2GB RAM 2xXeon P4's Veritas Backup Exec 9.1 (backup file size set to 1GB each) SATA hardware RAID control...

Last updated: Nov 5, 2004   3:20 PM GMT   |    Backup and Recovery, Dell PowerEdge, Disaster Recovery
The top 10 percent list, Part 4

Blog  This blog entryis Part 4 of a series on the top 10% of products and technologies reviewed by Storage Switzerland in 2011. See Part 3 here. Unstructured (big) data management Digital Reefs File Governance Platform is a content indexing and unstructured-data management software solution th...

Last updated: Nov 28, 2011   4:33 PM GMT  |  Blog: Storage Channel Pipeline
VMAX, VNX the new minority among EMC storage products

Blog  EMC provided more detail on its revenue and earnings last quarter, and the results could play into its product strategy leading into and following its acquisition by Dell.EMC Information Infrastructure (II) EMCs storage group reported revenue of $4.3 billion, down three percent year ove...

Last updated: Oct 22, 2015   1:14 PM GMT  |  Blog: Storage Soup   |      Storage
Pure founder: FlashBlade has more potential than FlashArray

Blog  Since introducing its FlashArray all-flash SAN array in 2012, Pure Storage has sold more than $600 million worth of a type of storage array that didnt exist before Pure was born. The man who led the design of that system says he expects its second all-flash platform to eventually sell even more....

Last updated: Apr 21, 2016   9:01 PM GMT  |  Blog: Storage Soup   |      Pure Storage
An inside look at Alibabas deep learning processor

Blog  From Huaweis Kirin 970 system-on-chip (SoC) that packs in a neural processing unit to Googles new Edge TPU that performs machine learning tasks on IoT devices, the use of dedicated chips to speed up artificial intelligence (AI) tasks has been in vogue in recent years. But not all chips are bu...

Last updated: Aug 29, 2018   5:23 AM GMT  |  Blog: Eyes on APAC
Cloud Means Change and Opportunity - If You Want It.

Blog  When we were recording Eps.100 of The Cloudcast, which was during VMworld 2013, a discussion came up about why people may have hesitations about Cloud Computing. We jokingly called the segment, "Why Does Cloud S**k?", and a number of people from the roundtable panel gave their opinions. One side was...

Last updated: Oct 1, 2013   1:39 AM GMT  |  Blog: From Silos to Services: Cloud Computing for the Enterprise
Cheaper then Windows Server

Answer  So here is the story. I am the IT person for a small vehicle dealership chain that is spread across 4 locations in the city. Each location is presently setup with a VPN connection to the main site which houses a database server hosting all the programs needed to run the dealership like, customer tra...

Last updated: Mar 24, 2009   6:20 PM GMT   |    Active Directory, Desktop management applications, Domain management
What's up, what's down: Oracle pushes into cloud CRM, hardware investments languish

Blog  Some things are up, some are down, I guess. That seems to be true with regard to tech signals this morning, anyway. Oracle is buying RightNow, a CRM cloud player, and the Street is reporting issues with hardware sales, both in the service provider and enterprise spaces. The RightNow buy is i...

Last updated: Oct 24, 2011   2:46 PM GMT  |  Blog: Uncommon Wisdom
Your smart devices should live on the edge

Blog  This is the second article in a two-part series. Read part one here. In my earlier article, I discussed the many benefits of smart devices, especially in industrial environments. I also discussed the challenges of capturing and analyzing data at the edge of the network. Now, its time to dive int...

Last updated: Jul 26, 2019   3:27 PM GMT  |  Blog: IoT Agenda   |      Edge computing, Internet of Things, iot
Transferring (only) AD from One Server to Another

Answer  So I have found plenty of scenarios with regards to moving to a new server, but not sure one exactly like mine. I am not a server guru by any means, as this question may attest to. Basically, we are moving campuses and want to ditch the old hardware and switch to a new server (still running Server 2...

Last updated: Sep 13, 2013   8:08 PM GMT   |    Active Directory, Server 2008
TechTarget's weekly roundup (2/17 - 2/24)

Blog  IBM image via ShutterstockIs IBM actually the leader in the cloud market? Find out if there's more to the story from the TechTarget writers as they investigate this and more in this week's roundup.1. IBM claims it's cloud revenue front-runner, but is it cloud washing? - David S. Linthicum (SearchClo...

Last updated: Feb 24, 2014   1:16 PM GMT  |  Blog: Enterprise IT Watch Blog
PCI DSS Requirement 10: Regularly Monitor and Test Networks

Blog  Payment Card Industry (PCI) Data Security Standards (DSS) compliance is often not a black and white assessment. Sure the PCI council gives you the complete assessment document, which fully explains each of the twelve (12) requirements and what is needed for validating each of these respective areas....

Last updated: Feb 11, 2009   10:27 PM GMT  |  Blog: Regulatory Compliance, Governance and Security
Dont omit the VMware Tools!

Blog  So, you are very proud of yourself because you can roll out Windows virtual systems like popcorn, right? Well, don't forget to ensure that you are using the correct version of VMware tools. This is important because it provides an optimized inventory of hardware for the guest operating system. On a ...

Last updated: Nov 7, 2007   3:10 AM GMT  |  Blog: The Virtualization Room
vulnerability management

Blog  Vulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design could compromise the security of an endpoint or network. Continued Quote of the Day "Organizations tackle the most severe vulnerabilities first and work their wa...

Last updated: Mar 9, 2017   3:02 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      vulnerabilities, vulnerability management
PREV 1...10   20   30...31   32   33   34   35   36   37   38   39   40...   50   60   70...111 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: