IPHost Network Monitor is a stable distributed network and server monitoring software. This tool allows monitoring of websites and...
Showing results 1 to 20 of 60
Telstra has acquired unified communications company NSC to boost its cloud, managed network, security services, and afford it with more contact centre resources.
The rise of the cloud and virtualization has given companies access to practically infinite business resources. Network Automation CEO Dustin Snell explains how to use automation to make the best of those resources.
Several developers say that customers running the new Mountain Lion version of Mac OS X are reporting crashes when connecting to network resources. The culprit appears to be found in Auto Proxy settings.
Soon, any and all forms of computing will be taking advantage of a mix of network and local resources. Why bother to call it anything but 'computing'?
In the beginning, Microsoft's system management suite, System Center, was all about managing network servers and other physical resources. Then along came virtualisation, so Virtual Machine Manager was added to handle virtual as well as physical systems.
This suite of networks tools implements most of the network diagnostics that you need as a Network Engineer or System Administrator....
The AFINGO platform supports a social network of "curated" production resources appropriate for small or midsize companies in the fashion industry.
All the hot air in cloud computing has been about apps, but we need to refocus on getting more network resources as services, says Lori MacVittie
McAfee VPN Client provides a secure remote connection to your company network. Strong encryption prevents eavesdropping and modification...
Sega has warned that the Sega Pass network of sites, which includes its gaming forums and press resources websites, has been hacked.The gaming company revealed the hack on Friday by sending an email to registered members.
National Broadband Network (NBN) CEO Mike Quigley has devoted NBN Co resources to conduct an extensive review of his time with global technology company Alcatel-Lucent during its multi-national bribery scandal, in the face of persistent questioning from the Coalition.
The chip maker has formed a partnership with 70 other companies to pool resources in the field of cloud research, with the ultimate aim of establishing a federated cloud network
Queensland IT Minister Robert Schwarten has today awarded five ICT infrastructure contracts for the consolidation of its network and datacentre resources.
Thanks to white space radios Hocking Valley Community Hospital has a WiFi network connected to broadband Internet resources.
As both Internet video and mobile entertainment devices like the iPad grow ever more popular, the load on network resources will only grow ever higher. Frankly, most public networks won't be able to handle it. After all, they're already failing.
Wireless operators around the globe are moving to tiered data pricing, which will likely cause developers to think differently about how they use network resources when creating apps.
Businesses need to establish guidelines governing the use of removable storage devices and shared network resources to better protect their corporate networks, a Microsoft executive has urged.
The National Broadband Network Company has nabbed Qantas's former executive general manager of human resources, Kevin Brown.
Over on my own blog, I wrote a short post about BusinessWeek's social network yesterday. Business Exchange is well-linked from the print magazine, and offers an opportunity for writers and readers to gather and share resources that inform or relate to stories.
Network administrators are always looking for tools that can save them time and help them optimize and secure their networks. I'm sure most, if not all, of you have your own list of favorite tools. In this IT Dojo video, Bill Detwiler talks about the following three net admin tools that our TechRepublic authors and members say they can't live without:1. PuTTY2. Wireshark3. NessusOnce you’ve watched this IT Dojo video, you can find a link to the original TechRepublic article, print the tip, and get links to additional Linux and open source resources from our IT Dojo Blog.
When you support small offices, home offices, and remote offices, you often run across older wireless equipment. Equipment that's likely secured with MAC filtering and perhaps a hidden SSID and WEP encryption.Most techs would agree that MAC filtering alone isn't going to secure a wireless network and that even WEP and a hidden SSID aren't much better. But does MAC filtering at least keep out the lazy hackers? In this IT Dojo video, Bill Detwiler shows you just how easy it is to spoof a MAC address.Once you've watched this IT Dojo video, you can find a link to the original TechRepublic article, print the tip, and get links to additional remote support and administration resources from our IT Dojo Blog.
Computer scientists at George Mason University (GMU) have developed a new software to identify complex cyber network attacks. This software is named CAULDRON (short for 'Combinatorial Analysis Utilizing Logical Dependencies Residing on Networks'). The developers claim that CAULDRON 'can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization's networks.' Their research was funded by grants from the defense, homeland security and intelligence communities and the Federal Aviation Administration (FAA). The FAA has already installed CAULDRON in its Cyber Security Incident Response Center to prioritize security problems. According to the developers, this software can be used 'in almost any industry or organization with a network and resources they want to keep protected.' But read more...