With vendor support, the latest version of the SDN-enabling protocol has key features enterprise networks need and gives customers confidence in its future.
Network Computing
Permanent link to this post (26 words, estimated 6 secs reading time)
Categories: General.
Tags: Matters, OpenFlow, Support
By IPHere —
March 7, 2014 at 12:14 pm Investment banking firm expects its journey to software-defined networking will be a long haul.
Network Computing
Permanent link to this post (17 words, estimated 4 secs reading time)
Categories: General.
Tags: Goldman, Marathon, Sachs, Says
By IPHere —
March 7, 2014 at 6:15 am You may have heard that the NSA has been spying on just about everyone, everywhere without regard for whether or not they are an actual threat to national security. The allegation that RSA accepted a payment of $ 10 million in exchange for cooperating with the NSA led some to boycott the recent RSA Conference, or participate in the TrustyCon counter-conference that was hosted around the corner. As it turns out, though, most IT professionals don’t seem all that concerned with the activities of the NSA.
This is a preview of
Survey: IT pros not concerned about NSA spying
.
Read the full post (103 words, estimated 25 secs reading time) Categories: General.
Tags: About, concerned, Pros, Spying, Survey
By IPHere —
March 6, 2014 at 6:13 pm A policy-driven approach is key to making sure video and audio traffic doesn’t clog up your network and affect performance of mission-critical apps.
Network Computing
Permanent link to this post (26 words, estimated 6 secs reading time)
Categories: General.
Tags: Applications, Managing, Network	, RealTime
By IPHere —
March 6, 2014 at 12:14 pm The advent of real-time communications, especially combined with mobile devices and the cloud, can take a toll on your network performance. Learn how to manage it all at the Enterprise Connect conference.
Network Computing
Permanent link to this post (35 words, estimated 8 secs reading time)
Categories: General.
Tags: Communications, Connect, Disrupting, Enterprise, Grip, Network
By IPHere —
March 6, 2014 at 12:14 am Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft’s lead and made its software more secure as well. According to data from the 2014 IBM X-Force Threat Intelligence Quarterly Report, the favorite target is now Java.
This is a preview of
Report: Half of all exploits target Java
.
Read the full post (151 words, estimated 36 secs reading time) Categories: General.
Tags: Exploits, Half, Java, Report, Target
By IPHere —
March 5, 2014 at 6:16 pm An emerging software-defined storage technology is getting a lot of attention, but using direct-attached storage as a common storage pool isn’t without complications.
Network Computing
Permanent link to this post (26 words, estimated 6 secs reading time)
Categories: General.
Tags: Future, Hype, Just, SAN's, Server
By IPHere —
March 5, 2014 at 12:13 pm Are you still using Windows XP? In its latest Threat Report, security vendor F-Secure warns that a powerful zero-day attack against Windows XP is a matter of when—not if—and provides some guidance for those stalwart (or foolhardy) PC warriors who plan to ignore the April 8 “XPocalypse” when Microsoft support for the OS officially expires.
This is a preview of
F-Secure report warns XP zero-day attack is imminent
.
Read the full post (127 words, estimated 30 secs reading time) Categories: General.
Tags: Attack, FSecure, imminent, Report, warns, ZeroDay
By IPHere —
March 5, 2014 at 6:14 am Here’s a look at how Paragon Protect & Restore 3 tackles today’s backup and recovery challenges.
Network Computing
Permanent link to this post (19 words, estimated 5 secs reading time)
Categories: General.
Tags: backup, Burden, Easing
By IPHere —
March 4, 2014 at 6:14 pm Winning approval for planned maintenance can be difficult. Showering upper management with information — and striking a little fear — can help get the job done.
Network Computing
Permanent link to this post (29 words, estimated 7 secs reading time)
Categories: General.
Tags: Done, Maintenance, Ways, Work
By IPHere —
March 4, 2014 at 12:19 pm