Cloud backup pioneer Asigra announced a new pricing model based on data restoration. Meanwhile, EMC announced slew of updates to its enterprise backup portfolio.
Network Computing
New Cloud Backup Pricing Targets Recovery
Comments Off
Categories: General.
Book Review: CCNA Data Center Study Guide
New book is good preparation for the Cisco 640-911 exam but also provides a thorough and interesting explanation of network fundamentals.
Network Computing
Comments Off
Categories: General.
QoS Boosts Health of Telemedicine Network
Renown Health monitors quality of service on its network to ensure high-quality telemedicine, video and telephony service for patients in rural areas.
Network Computing
Comments Off
Categories: General.
Designing a Network Protocol
In this article, I look at constructing the communication protocol for a personal area network. The network consists of low-power nodes that capture physiological data from sensors and condition it before sending it to a central node for processing. In this system, each node is connected to different sensors, which collect various physiological data. The collected data depends on where the sensor node is located on the body. Some of the information collected in this system includes electroencephalography (EEG), electrocardiogram (EKG/ECG), and body temperature. Each node retrieves the sensor data at a specific rate, stores the data locally, and then transmits its data to a central processing node (CPN). The CPN has the responsibility of storing the node’s data, performing algorithmic processing on it, if necessary, and then transmitting the results to a remote device.
Comments Off
Categories: General.
RAM Caching Vs. SSDs: A Startup’s Gamble
Startup Infinio bucks the SSD trend by using RAM caching instead of flash to accelerate NFS storage performance. Is it a good bet?
Network Computing
Comments Off
Categories: General.
Many SSL Connections Missing Added Protection, Netcraft Says
Most SSL traffic doesn’t use PFS, opening it up to possible decryption, according to Internet security firm.
Network Computing
Comments Off
Categories: General.
New Gaping Security Holes Found Exposing Servers
A widely deployed protocol and controller used in servers and workstations both contain serious vulnerabilities that, in effect, give attackers near-physical access to the machines, a pair of renowned researchers said recently.
HD Moore, chief research officer at Rapid7 and creator of Metasploit, and security researcher Dan Farmer announced findings of their research on major flaws in the Intelligent Platform Management Interface (IPMI) protocol and the Baseboard Management Controllers (BMC) packaged with most servers for remote management purposes.
Comments Off
Categories: General.
3 Steps For SMBs To Tame Their Mobile Threats
Mobile device management gives companies a great deal of control over employees’ devices, but for small- and midsized businesses that are embracing the bring-your-own-device movement, the technology can be too much complexity for too little gain.
Apart from the difficulties in implementing a mobile device management (MDM) solution, mixing the technology with employee-owned devices poses pitfalls for companies, especially smaller ones.
Comments Off
Categories: General.
Microsoft Ends TechNet Subscriptions
As the Internet spent its Monday lamenting the shutdown of Google Reader, Microsoft quietly closed its TechNet subscription service for IT pros.
“Microsoft is retiring the TechNet Subscriptions service to focus on growing its free offerings,” Microsoft said on the TechNet site.
Comments Off
Categories: General.
SSDs And The Write Endurance Boogeyman
How I learned to stop worrying and love the flash.
Network Computing
Comments Off
Categories: General.