Printer Friendly

Articles from Communications News (May 1, 2008)

1-37 out of 37 article(s)
Title Author Type Words
Air management. 109
Are hosted services right for you? Lower costs, uptime guarantees, continuous monitoring and trained staff are all potential benefits. Agarwal, Ravi 819
Attacks now mostly Web-based. 323
Back to basics to fight botnets: employee education might be the best tool for fighting invasion of computer networks. Pappas, Ken 585
Cabinet rack. 84
Cabling changes in store for 2008: fiber to the desktop, Wi-Fi networks and copper prices affect plans. Bisbee, Frank 709
Endpoint encryption. 111
Endpoint security and control. 105
Endpoint security. 105
Events. Calendar 143
Firm turbocharges Web meetings: conferencing appliance and Web interface allow numerous departmental and training sessions. Nibler, George 982
Four tips on load balancing: high-volume network applications are driving the need for optimization technologies. Chen, Lee 570
Global overhaul: Neeraj Rajpal, CIO at law firm Bryan Cave, realized his distributed communications network was architecturally challenged. Cover story 1964
Green is also the color of money: saving money, not corporate social responsibility, is the primary driver in the green IT movement. DiRamio, Denise 622
Hospital care. 90
Lifecycle management. 132
Linen change. 88
Managing voice matters. Ellis, Benjamin 631
Network access control. 117
Now it's Enterprise 2.0. 305
One-time password token. 89
Portable hard drive. 87
Remote office data protection. 99
Rethink data center requirements: midsize organizations should emulate big company solutions on a smaller scale. Garrison, Stephen 609
SaaS marketers face skeptics. 507
Secure access. 82
Security as a service. Andenberg, Ken 447
Small business tries ASPS. 646
Spam volume could double in 2008. 241
Switched/metered PDUs. 88
Teleworking making strides. 262
The advantages of a hosted PBX: the key benefit (besides cost savings) is that the service can send calls virtually anywhere. Brashier, Greg 960
User activity monitor. 101
Virtualization affects applications: the infrastructure needs to be built so that capacity can be changed and resources removed transparently. Peles, Amir 1172
Web application security. 96
Wi-Fi analyzer. 130
Wireliess access. 94

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters