Showing results 1 to 20 of 25

ITIL needs to get real

IT infrastructure library guidelines remain relevant but need more examples on implementation and reflect current trends such as cloud and mobility, urge observers.

February 7, 2012 by

IBM, QUT team up on smarter transport

IBM has hitched its smarter cities bandwagon to the Queensland University of Technology (QUT), teaming up to handle the implementation challenges of deploying intelligent transport infrastructure.

March 22, 2011 by

Study 'erodes' Telstra's options: analyst

As the government sets a deadline for negotiations with Telstra on the terms under which it would move its customers and infrastructure into the National Broadband Network (NBN), financial-services firm Goldman Sachs JBWere (GSJBW) has said that the newly released NBN implementation study "erodes" Telstra's bargaining position.

May 6, 2010 by

NBN Co picks cream for $23m IT deal

As first reported on, NBN Co has selected Oracle as its lead software provider, adding IBM for infrastructure hosting and Accenture for implementation and support.

March 31, 2010 by

Revving up the electric-car industry

At the Green:Net conference in San Francisco, John Clark of GridPoint and Richard Lowenthal of Coulomb Technologies discuss how the largest obstacle for next-generation electric cars is standards. The executives believe that standards in IT infrastructure and the power grid are necessary for any successful large implementation.

March 26, 2009 by

Delivering the Olympics: Akamai and Limelight respond

Akamai disputes Limelight Networks' take on its infrastructure and my recent post, Limelight Networks: Why the Olympics didn't 'Melt' the Internet. Limelight, however, says its implementation facts are accurate and that it absolutely stands behind its words.

August 18, 2008 by

Ruckus wireless LAN security method solves usability versus security dilemma

One of the biggest problems with wireless LAN security standards is the lack of an intermediate solution.  Your only choices in securing a wireless LAN were to deploy enterprise grade WPA wireless LAN security which requires RADIUS (Remote Authentication Dial In User Service) servers in addition to a PKI (Public Key Infrastructure) or you deployed shared secret technology using WPA-PSK.

January 4, 2008 by

Virtual labs and education

Yesterday, I asked for people to share their thoughts via a guest blog on virtualization in Ed Tech.   Guest blogger Erik Josowitz provided us with the following (thanks, Erik).  Feel free to talk back or submit your own guest blog with some specific experiences or implementation details. Virtualization is great tool but, like any Swiss-Army knife, success with it depends on the task at hand. One of the places that people get into trouble with virtualization is when they try to use out-of-the-box virtual infrastructure with non-technical audiences. Virtualization is a great solution but often is not a complete solution.In education we've frequently seen challenges that look like appropriate places to implement a virtualization solution, only to find that the end-result is not fully usable by the intended audience. One example is providing hands-on lab environments to support application training. Success in the workforce today depends on high-level application skills and there is no better way for students to attain those skills than through hands-on use of the software applications. Many educational institutions provide computer lab environments to help support their student population and provide access to necessary software applications. Many of these lab environments have become the source of IT management problems as they become virus-ridden, get subverted as distribution sites for pirated software or music, or just plain have the normal IT management issues associated with a shared resource in a public environment. For many institutions their student population brings with them their own PCs which solves one problem but creates another. The lab issues diminish but the problems of providing secure access to software (and software licenses) often takes its place.The answer, we've found, is virtual lab management - using virtualization to deliver secure computing environments as a shared resource. Virtual labs allow administrators to serve up a clean and unchangeable environment for each student - in the lab or on their own PC - on-demand. This makes it easy to provide access to applications that students either can't afford individually or that their home PCs cannot support. It makes it simple to track and monitor lab usage and to control the use of resources so that systems are not subverted into file servers. Virtual lab management sits on top of virtualization (from Microsoft or VMware) and tells it what to deliver and to who. It makes it easy for non-technical users to select the types of applications they need from a menu and to gain access to those environments without needing to understand virtualization, networking, hosts systems or anything about how it gets delivered. Best of all, virtual labs make it easy to manage capacity. By scheduling time in the lab environment the shared resource is managed for maximum utilization. If more capacity is needed it is simple to add additional resources to the system. The end-users simply see an increase in availability.Virtualization may not be a panacea for educational institutions, but for a subset of problems, a centralized virtual lab may enable technology administrators to focus their time and attention on enabling learning rather than administering systems.

December 19, 2007 by

Why OLPC mesh wireless networking won't work

One of the touted features of the $200 OLPC laptop is the peer-to-peer mesh topology networking feature that can theoretically bring an Internet infrastructure where there is no network infrastructure. The problem is that peer-to-peer wireless LAN mesh topology sounds better than it actually works and there's a good reason it isn't used commercially.

September 24, 2007 by

Double-Take for VMware Infrastructure

This is an excellent tool for replicating virtual machines (VMs) running on VMware ESX Server 3.x and VirtualCenter 2.x. Although the suite is relatively new, impressive usability features hint at Double-Take’s long history in replication.

August 28, 2007 by

Microsoft and open source: Frost sightings in hell

In a guest post, Stephen Walli -- a software consultant specializing in open-source, and a former Microsoft program manager for the Shared Source implementation of the ECMA Common Language Infrastructure -- shares his two cents on Microsoft's recent open-source-related moves.

August 2, 2007 by

IAG cuts server fleet down to size

Insurance Australia Group (IAG) has cut down its server count by 600 machines over the past 12 months through the implementation of virtualisation software. IAG head of infrastructure Andrew Cresp said the company currently ran 900 servers after struggling with 1,500 around a year ago in its primary datacentre in Melbourne.

April 8, 2007 by

Layer 2 security; the forgotten front

One of the fastest ways for hackers to breech security systems is to circumvent Layer 2 which is your LAN switching infrastructure.  Unfortunately that also happens to be one of the most overlooked aspects of Information Security with most security audits focusing on policy and compliance issues on the upper layers of the stack.

January 30, 2007 by

Virgin Blue on ITIL runway

Virgin Blue is implementing a new service management system this month as the airline moves towards adopting the Information Technology Infrastructure Library (ITIL) framework.Virgin Blue general manager of information technology, Nick Brant, said the airline had purchased BMC's Remedy service management software at the start of the year -- following a tender -- and was in the final stages of implementation.

June 6, 2006 by

WLAN market to reach $5 bln by 2006

The wireless LAN market is expanding year after year along with the rapid spread of broadband infrastructure, Research and Market says. Recent advances in technology have made commercial deployments of wireless networks possible, opening up a potentially huge business opportunity.

July 6, 2005 by

Security remains top concern for wireless deployments

A recent survey by In-Stat/MDR has led the high-tech market research firm to conclude that Wireless Local Area Networks (WLANs) are moving beyond simply being an "overlay" to the wired LAN, to becoming a more pervasive and integral part of business customers' network infrastructure.

December 12, 2004 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories