When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of existing storage systems when coupled with intelligent archiving and automated tiering, the pros and cons of different SSD approaches, and tips to overcome concerns of reliability, manageability and scalability.
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Imagine if you gave up a quarter of your office space for non-work activities; it’s inconceivable. But when it comes to internet bandwidth, most companies loose the same proportion to employee web misuse, streaming media and spam. As a company’s internet is both costly and limited, click here to find out how best reduce bandwidth loss.
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
A key priority for Ryerson is to provide consistent access to network applications, which range
from a public-facing web site to critical applications such as student registration and learning
management. With students, faculty, and staff all vying for the same resources on the network
(including as many as 5000 wireless users at any given time), Ryerson needed a way to provide a
predictable user experience. Read more.
From 2009 through early 2011 MLB Network connected to the outside world through dual
45-megabit DS3 circuits, but with as many as 1000 users during the baseball season transferring
everything from video files to player statistics, the network had reached saturation. “We were
seeing 98% utilisation on our routers then, and wanted to ensure we were prepared for the MLB
First-Year Player Draft in June,” said MLB Network IT director Cindy Cortell. Read more.
The Nimsoft for Network Monitoring solution verifies network connectivity to devices and application services revealing accessibility and network latency. The solution auto-discovers network interfaces, monitors interface traffic and calculates bandwidth utilisation. Interface variables are polled for status data and the solution receives unsolicited SNMP traps. Syslog monitoring is supported for non-SNMP devices. Status data is analysed and displayed in graphical alarm consoles, performance reports and SLA reports. Read more.
Most IT racks have the same look, but rarely have the same feel. We have developed racks specifically for servers and networking which account for important details like cable management and power distribution. This solution pairs our optimised rack solutions with a high availability UPS for protecting all of
your critical equipment as simply as possible. Read more.
The NetShelter CX enclosure is designed specifically for deploying equipment in nondedicated spaces like offices and schools. This solution is truly an all-in-one, easy to manage solution for networking deployments outside of the closet.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.