- Welcome Guest
- Sign In
In the past, network management mainly consisted of monitoring whether routers and switches were up or down -- as long as the power light was on, it was available, and the network administrator could proclaim, "It's not the network." With pervasive wireless connectivity and handheld devices capable ...
A customer is visiting your e-commerce Web site. She's decided to do more online shopping this holiday season to save on gasoline and find the lowest prices. She's using a Mac running Safari, but your site is optimized for Internet Explorer 7 and your development budget is mainly focused on preparin...
Some people say that there's nothing worse than a sour economy. I, for one, don't agree. What could possibly be worse, you ask? Simple: a bad economy in the middle of a budget cycle. Securing funding for technology projects is hard enough nowadays, but IT security projects have it even harder. Try ...
As more business-critical applications are being deployed, organizations are increasingly looking to gain visibility into network and application performance and, more importantly, improve usability of this information. Visibility into network and application performance has been identified as one o...
Even though there is much debate raging over the impact of human activities on our environment, a diverse group of industry leaders, government agencies, environmental groups and others do agree on one thing -- that energy efficiency is the most significant issue facing technology providers and thei...
For end users, Network Access Control should be transparent, as if it's not there. Depending on a company's internal security policies, systems are checked quietly in the background for their level of compliance. NAC checks for current patch levels and functioning, up-to-date antivirus and personal ...
While enterprises may be on top of their security practices for the most part, data leakage as a result of end user misuse and abuse is something that might very well be flying under the radar. According to a newly released global study by Cisco, "The Challenge of Data Leakage for Business and Emplo...
It's hard to dismiss the role of the Internet in this year's elections. Both political parties are using online strategies to an extent never seen before in a political campaign. From daily candidate blogs with updates on issues, to made-for-YouTube commercials, to the use of technologies such as ...
Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...
Software is an integral part of everything we do now -- drive a car, make a phone call, turn on the TV, get on an airplane and, yes, exercise your franchise. Is this the same software that just crashed my new cell phone or sent my credit card number off to a hacker in Eastern Europe? Well, not exact...
Physicists tell us that only a small percentage of the universe can be seen directly. In fact, the vast majority of the universe is what they call "dark" -- composed of matter and energy that we know is there but that we can't observe, identify or analyze directly. The concept of "dark matter," firs...
Aberdeen's benchmark report, "Optimizing WAN for Application Acceleration," found that Best-in-Class organizations are 69 percent more likely to outsource optimization of their WANs to third parties as compared to Laggards. This research also reveals that these organizations realize that the effecti...
Ever heard of Themistocles? In case you haven't, it's a tragic story. Themistocles was an Athenian statesman and general who lived around 500 B.C. He was one of the leading political minds of his time, and perhaps one of the most brilliant military strategists of his -- or any -- time as well. As...
Online video is currently the buzz topic dominating news cycles -- technology, content, search, distribution, syndication, aggregation, advertising, widgets ... OK, I think you get it. The migration of content delivery has done just that: migrated. Consumption of online video has shifted from cable ...
Information technology plays a vital role in today's business environment. Well-designed and developed applications are a key element for success -- particularly for organizations that rely on the Web and intranet for conducting business with customers and communicating with partners and employees.