dcsimg

Drew Robb - Article Archives - Page 11

OpenVMS Gets a Case of the DT's

August 18, 2004
Legacy OS carves a niche in disaster recovery.
READ MORE

OpenVMS: An Old OS Hasn't Lost Security Footing

July 13, 2004
Though some have thought that OpenVMS is yesterday's operating system, it's actually powering a lot of businesses, showing off its security and reliability.
READ MORE

Securing your Storage Assets

July 13, 2004
If you can't afford a second data center for disaster recovery, what can you do to physically protect your environment?
READ MORE

Getting Aggressive in Battling Spam

July 7, 2004
Since we're a long way from email Utopia, here are some weapons in your ongoing battle against spam.
READ MORE

Integrated Disk-based Backup at JetBlue

May 26, 2004
Like many growing companies, JetBlue Airways struggled with an ever-lengthening backup window. By adding disk-based backup, the airline cut its backup window by half and reduced the labor involved by IT personnel.
READ MORE

Improving Disaster Recovery Without Breaking the Bank

May 6, 2004
FleetBoston Financial recently took on its disaster recovery time. Our Datamation reporter takes a look at how the company improved its system without breaking the bank.
READ MORE

Storage Security: Getting Beyond M&M SANs

February 25, 2004
Like the candy-coated treats, SANs are an irresistible lure to criminals that can't wait to get to the soft, sweet center.
READ MORE

Case Study: The Stocks Must Go On

January 15, 2004
Despite blackouts, disasters, and human error, financial systems must keep running. NYFIX met this challenge by migrating to enterprise-class backup systems.
READ MORE

Is the Tide Turning in Battle Against Hackers?

January 13, 2004
How are we really doing in terms of computer security? Scanning the news, it looks like we are under constant attack. Our eSecurityPlanet reporter takes a look at changes in offenses, and defenses, and figures out where we stand.
READ MORE

Getting Beyond M&M SANs

December 22, 2003
Like the candy coated treats, SANs are an irresistable lure to criminals that can't wait to get to the soft, sweet center.
READ MORE

DHS Takes a Stand on IT Security

December 19, 2003
With cyber security high on the list of national security efforts, the Feds are looking for the private sector to step up and take control.
READ MORE

The Stocks Must Go On

December 1, 2003
Despite blackouts, disasters and human error, financial systems must keep running. NYFIX met this challenge by migrating to enterprise-class backup systems.
READ MORE

Leaping Hurdles to Safeguard the SAN

November 26, 2003
Managers who know security is a huge problem at the corporate level don't always recognize how insecure their storage networks really are. Our eSecurityPlanet reporter looks at the increasing prevalence of SAN insecurity and what IT managers can do to safeguard their storage assets.
READ MORE

Plenty of IM Security Holes Left to Plug

October 31, 2003
Instant Messaging can speed critical communications across the corporate network, saving time and giving an edge to team projects. The trouble is that IM also can speed viruses into the network and provide corporate secrets to competitors without leaving a trail.
READ MORE

Who Needs Mobile Backup?

September 2, 2003
Despite IT resistance, the growing legions of mobile users are forcing enterprises -- and network admins -- to confront laptop backups.
READ MORE

Are You Giving Company Information Away?

July 28, 2003
That computer your company is getting rid of might not be as clean as you think it is. In fact, it might still be holding critical financial, legal and personnel information -- even as it goes out the door into someone else's hands.
READ MORE

The Emergence of Secure Content Management

June 9, 2003
Content has changed the requirements of enterprise security, exposing the fact that anti-virus software is no longer enough. Instead, a new market is emerging known as secure content management to address the need for policy-based Internet management tools.
READ MORE

Robbing the (Data) Bank

June 5, 2003
Security concerns surface about centralized storage.
READ MORE

Zero to 8,000 in 48 Hours

April 4, 2003
Most IT departments have the luxury of rolling out their wireless networks on a gradual basis. Stewart Seruya, chief security and network officer at the University of Miami, has two days. Here's a look at the three-step custom solution he devised.
READ MORE