Even though it filed Chapter 11 and is reportedly looking to sell off huge chunks of its business, Nortel is …
Nortel continues the enterprise fight
Even though it filed Chapter 11 and is reportedly looking to sell off huge chunks of its business, Nortel is …
Aruba unveils low-priced WLAN gear
Aruba Networks showed off a new family of low-priced wireless LAN access points and controllers designed for fast setup and …
HP ProCurve gets into security with new server blade
HP ProCurve is adding a security blade to edge and core switches that enables businesses to insert firewalls, VPNs and …
IT Pros describe the ideal mobile device
Netbook sales will likely grow by 50% in the next two years, according to research firm IDC, but the gadgets …
Cyberoam new offering for small office security
Cyberoam has launched the CR15i, an all-inclusive security appliance that specifically caters to the business requirements of small offices. The …
Nortel expands its NAC offerings
Nortel today is announcing a second offering in its family of NAC products, a software platform that runs only on …
Unified communications applications coming to the cloud
Expect more communications services from cloud-computing providers such as IBM's LotusLive Engage that becomes available tomorrow, according to makers of …
IETF to explore new routing technique
The IETF is forming a new working group to address scalability issues in the Internet's routing system caused by companies …
7 reasons MPLS has been wildly successful
The IETF threw a birthday party for one of its most successful standards: Multi-Protocol Label Switching. The Internet’s leading standards …
Cisco security updates squash router bugs
Cisco has released eight security updates for the Internetwork Operating System (IOS) software used to power its routers. The patches …
Force10 fortifies data centers with new switch
Force10 Networks this week unveiled a new line of switch/routers designed to improve the performance, management and cost effectiveness of …
Selecting an UTM
While information security has became the most important aspect for any form of business process, the mushrooming of vendors in …
Juniper introduces Adaptive Threat Management
Juniper is this week introducing software that lets security platforms – even those made by other vendors – share and …
Virtualisation: What are the key steps?”
For those of us who grew up praying in the temple of the mainframe, the concept of virtualization is nothing …
3 Nightmares When Managing Macs
How hard is it managing Macs in the enterprise? Harder than you might think. Expect lackluster enterprise support from Apple …
Microsoft details contents of enterprise bundle for Windows 7
In a series of briefings held on both coasts last week for product reviewers, Microsoft detailed the features that will …
Check Point overhauls its security software architecture
Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and …
More specialty Linuxes to the rescue
The day of the mold-your-own OS has come, and Linux is the clay. Linux provides free and open access to …
AT&T makes $1 billion ’09 network investment
AT&T will invest $1 billion this year to expand and upgrade its global network with a particular emphasis on adding …