IT admins can’t clone themselves, but they can get darned close to being two places at once by using mobile tools. The following Android apps, several of which are free, offer handy consoles for network mapping, remote client administration, cloud management, Wi-Fi analysis and more.
Network Computing
10 Android Apps for IT Admins
Comments Off
Categories: General.
RIM launches invitation-only BlackBerry 10 evaluation program
It seems that BlackBerry 10 is on track for an early 2013 release. RIM today announced the launch of a BlackBerry 10 Technical Preview program for 120 select customers.
Organizations participating in the BlackBerry 10 Technical Preview are getting early access to the new BlackBerry Enterprise Service 10 enterprise mobility management platform, as well as to a limited number of pre-production BlackBerry 10 smartphones. The beta will give these 120 organizations a chance to explore the features and benefits of BlackBerry 10, and provide valuable real-world feedback RIM can use to work out any remaining hiccups before BlackBerry 10 becomes available to the general public.
Comments Off
Categories: General.
How To Configure Cisco Nexus 5500 Virtual Port Channel
Cisco Virtual Port Channel (vPC) technology enables multi-chassis link aggregation (MLAG) in Nexus 5500 data center switches. This article walks through how to create a vPC domain between two Nexus switches, including code examples and configuration tips.
Network Computing
Comments Off
Categories: General.
SDN: Is Big Data a Killer App?
A major promise of software defined networking is that it will unleash new applications to take advantage of network programmability. Big Data may be one category poised to leverage SDN.
Network Computing
Comments Off
Categories: General.
You should have Cain & Abel in your security toolbox
There’s a sort of cruel irony to passwords. The legitimate passwords people need to use to access crucial applications or data are often forgotten, and yet the bad guys seem to be able to crack passwords without breaking a sweat. Thankfully, there’s a free tool available that can help you in either of these cases—Cain & Abel.
Comments Off
Categories: General.
Is Internet Explorer leaking sensitive information?
Do you use Internet Explorer? If you do, hopefully you’ve already applied the updates from Patch Tuesday earlier this week. But, even if you did it seems your browser might still be vulnerable to a potentially serious issue.
Spider.io, a company in the business of helping customers distinguish between actual human website visitors and automated bot activity, claims to have discovered a flaw that affects Internet Explorer the current flagship browser from Microsoft, versions 6 through 10. The vulnerability reportedly allows the mouse cursor position to be tracked wherever it is on the screen—even if IE is minimized.
Comments Off
Categories: General.
3 Fixes: Hybrid SSD Array Performance Gap
To solve performance problems, many data centers are turning to the solid state disk (SSD), but there is a question about how to best leverage this high-speed device in new systems often referred to as hybrid SSD storage systems.
Comments Off
Categories: General.
Will Mobile Drive or Replace UC?
UC vendors must create a more integrated experience on mobile devices to capture the ease of use and flexibility that users demand on smartphones and tablets—and to counter native capabilities that could make UC less relevant.
Network Computing
Comments Off
Categories: General.
Bitten By SaaS, But Still Going Back
A SaaS application I rely on shut down recently. No massive disruption ensued, but it’s a reminder that companies must take steps to mitigate the potential loss of a SaaS provider.
Network Computing
Comments Off
Categories: General.
S.C. Security Blunders Show Why States Get Hacked
This holiday season, millions of people who live or work in South Carolina have a special treat in store: the potential for their identities and savings to get misused.
That’s thanks to the state’s Department of Revenue having stored 3.3 million bank account numbers, as well as 3.8 million tax returns containing Social Security numbers for 1.9 million children and other dependents, in an unencrypted format. After a single state employee clicked on a malicious email link, an attacker — unnamed Russian hackers have been blamed — was able to obtain copies of those records. The state has now urged anyone who has filed a tax return in South Carolina since 1998 to contact law enforcement officials.
Comments Off
Categories: General.
