Latest Technology News from the TechTarget Network
Thursday, September 16, 2010
- Networking vendors aim to improve server virtualization security
Server virtualization security is no longer guaranteed by creating physical security zones for different classes of virtual machines on host servers. Networking and network security vendors are introducing virtual security products that apply security controls and policies directly to virtual machines within virtual hosts.
- Hacking tool exploits faulty AES cookie encryption implementations
Microsoft's popular Web framework, ASP.NET, fails to protect encrypted cookies that store online credentials on some popular banking and shopping websites.
- IT pros unsure Oracle can cut it as a hardware power
Oracle faces big challenges selling Sun data center appliances; stemming server defections.
- KVM supports live migration without shared storage
A new Red Hat utility could solve long-standing problems with live migration of virtual machines and even enable the move to public clouds. But users remain cautious.
- Selling enterprises on IPv6 migration: Like getting kids to eat veggies
Carriers must pitch the IPv6 migration to enterprise customers as a gradual process and focus the conversation on enabling business continuity rather than simple scare tactics.
- HP's entry-level server finds home in labs: News in review
Hewlett-Packard's ProLiant MicroServer targets very small businesses but is drawing interest for home labs. Plus: VMware-Novell acquisition rumors heat up, and more.
- FDIC releases guidance on digital copier security and printer risks
Financial institutions need to implement policies and procedures to protect sensitive data stored on devices like copiers, agency says.
- Vendor selection process: When gambling with a UC startup backfires
UC pros shared their cautionary tales of what happened when their decision to choose a startup from their unified communications vendor selection process backfired.
- RAID level comparison chart: A free download
Download our free RAID level comparison chart, where the most important RAID levels are defined, along with information about the pros and cons of each RAID level.
- Google Gmail scandal opens cloud security can of worms
A recent privacy breach in Google's Gmail service raises more red flags around the security of cloud-based applications and data privacy.
- Rackspace eliminates hourly billing for Red Hat cloud instances
Citing changes in its licensing deal with Red Hat, Rackspace will now charge a monthly fee for open source cloud instances.
- Cisco offers Unified Network Services
Cisco has launched Unified Network Services, designed to deliver network services in different environments; plus more daily news.
- Unplanned networking outages: How vCSHB can help
Our VMware expert explains the features of vCSHB and tests the unplanned loss of VMware channels and the principal public network.
- vCSHB failover tests: Avoiding split-brain
Our VMware expert experiments with vCenter Server Heartbeat and explains how the service can help with failover and unexpected vCenter outages.
- A guide to VMware vCenter Server Heartbeat
Mike Laverick offers a four-part series on how to successfully install and operate VMware's vCenter Server Heartbeat.