HomeNetworking

Networking

Are You Who You Say You Are?

Under a department of Defense policy in place for about five years, personnel have been required to use smart cards and public-key infrastructure credentials...

Enterasys Broadens Security Portfolio

Enterasys Networks will jump into the network access control fray early in May at Interop when it launches what officials claim is the first...

IBM Adds Members to Blade.org

IBM is adding 16 members to its Blade.org group and is unveiling two security products from partners based on its BladeCenter blade servers. The April...

DiVitas Appliance Promises Practical Enterprise Wireless

DiVitas Networks has launched a new unified mobile communications appliance, promising enterprise workers seamless coverage, including cross-Wi-Fi and cellular-network roaming. The company claims that the...

Fedora Core 5: Shape Shifter – 1

Red Hats Fedora Core 5, which hit the Internet late last month, shines in the server and developer roles with which Linux has come...

Group Creating Tools to Rate Server Power Use

Several top computer industry companies are on the road to creating a universal set of measurements for server power consumption—something they hope will become...

Smaller Desktops on the Way

In the news this week, Red Hat acquires JBoss; mini-tower desktop computers are on the way out; TIAA-CREF officials say they have fixed their...

CA Nabs Cybermation in $75M Deal

CA hit the acquisition trail again April 13 to pick up automated job scheduling provider Cybermation for $75 million. Although the Islandia, N.Y., company is...

Data Mining and the Tax Man

Data mining is not just for breakfast anymore. Or something like that. Where its focus has been on collecting data and reporting past trends,...

Group Launches CMDB Standards Effort

Four vendors in the emerging market for enterprise-wide configuration management databases joined together to launch an effort to create a common specification for sharing...