© Copyright 1988-2012 Sandra Kay Miller- All rights reserved.
"Effective Security Training" - Training End Users In Security Policies & Practices Is Essential To The Enterprise
"The Environmentally Friendly Data Center" - Reduce Your Carbon Footprint In The Face Of Environmental Concerns & Rising Energy Costs
Netbooks - Are They A Reasonable Business Option?
"Storage Network Snags" - Setting Up Storage Networks Comes With A Host Of Potential Complications To Avoid
"What's In Store" - Taking a Look At Network Attached Storage Systems
"Compliance Assistance" - Howe SMEs Can Choose The Right Vendor
"On The Go" - A Look At Leading Mobility Software
"IP Phone Systems" - Next-Generation Telephony
"Email Utilities On The Rise" - Because Of Increased Threats, SMEs Turn To New Tools
"Circuit Breakers Or Fuses?" - It?s A Question Of Power Safety In The Data Center
"What?s Available In Raised Flooring" - A Good Foundation Makes All The Difference
"Enterprise Firewalls" - One-Stop Shopping For Perimeter Defense
"Wireless Management Software" - Top Tools For Managing & Testing RF Signals
"Power Struggle" - Calculating Electrical & Mechanical Loads For The Data Center
"Road Warrior Weapons" - Some Of The Best Products For Users On The Go
"Chilling With Portable AC" - Staying Cool In Your Data Center
"Software For Business Intelligence" - Taking A Look At CRM Solutions
"Reining In IP Addresses" - IP Address Management Solutions Help Control The Growing Chaos
"Balancing Connectivity With Security" - Taking A Closer Look At Access Control Technologies
"Whom Are You Going To Call?" - Taking A Look At IT & Data Collection Hardware Repair Services
"The Push For The On-Demand Enterprise" - Service-Oriented Architectures Are Making It Possible
"Wireless IDS/IPS Solutions" - Locking Down Thin Air
"Enterprise Resource Planning: Not Just For Big Business" - Small To Midsized Enterprises Benefit From ERP, Too
"The Super Listener" - Bluesocket BlueSecure First To Market Centralized IPS For RF Transmissions
"A New Face In The Executive Suite" - Chief Compliance Officers In Hot Demand For Industries Bound By Regulatory Compliance
"Automated Virtualization" - PlateSpin?s PowerConvert 5.1 Adds More Flexibility To Conversions
"KVM Solutions: Command Central" - Assess Your Small To Midsized Enterprise?s Needs To Find The Right Device
"Hooked On Brooktrout?s SnowShore IP Media Server " - Reel In This Software-Based Carrier-Grade Beauty
"Strike A Balance Between Budget & Growth" - The Important Storage Issues That Today?s SMEs Face
"Remote Power Management" - These Options Can Save You Energy & Money
"VPN Appliance Options" - Two Distinct Types For Different Security Challenges
"The Latest In Environmental Controllers & Sensors" - A Rundown Of Leaders In The Industry
"Identity Management Applications: Solve User ID Problems" - New Solutions Address Different Facets Of IdM
"The Firefox Toehold In The Enterprise" - Has The Fad Passed For SMEs?
"Taking The Pain Out Of Compliance" - Tripwire?s Compliance Preparedness Services Aid With Audit Management
"Project Success Advice Disguised" - Humanizing IT Not As Simple As It Sounds
"No Longer Just A Simple Upgrade" - Migrating From Windows 2000 To Windows 2003
"Good News For Visual Learners" - The Illustrated Guide To Server 2003 Breaks Down Complex Tasks BOOK REVIEW
"Totally Surrounded By Wireless" - Start Planning For The Wireless World Now
"HP?s Adaptive Enterprise" - Bridging The Gap Between Business & IT
"Shopping For Wireless" - Choose The Right Technology To Meet Your Needs
"Secondhand Hardware" - With A Little Research, Used Equipment Can Be A Smart Option
"Service Contracts Dissected" - How To Get The Most Out Of A Service
"Exit Strategies" - IT Policies For Employee Terminations
"Understanding Erlangs" - Make Smart Trunk Line Decisions For Call Center,
"When Sight & Sound Meet The Network" - The Convergence Of AV & IT,
"Spyware: The Next Wave Of Malicious Code" - Can New Laws & Software
"2004: The Year Of Convergence" - Integrated Technologies In Mobile & Wireless Devices Abound
"Antitrust Laws: Not Just For The Big Boys" - SMEs Must Also Obey The Same Laws
"Mobile Device Management" - Don?t Let Support & Integration Concerns Overwhelm You
"Moore?s Law Strikes Again" - Ultrawideband: Is The Wireless Future Really This Close?
"A Big Pipe In Thin Air" - High Capacity Fixed Wireless Is Making Big Waves
"Who?s Calling The Shots?" - IT Procurement & Support In SMBs
"R U Ready For IM?" - Enterprise IM Brings Real-Time Communication To SMBs
"So Close, Yet So Far Away" - Wireless VoIP in the Enterprise
"Dot the I's and Cross the T's" - The Role of an Information Security Manager
"Information Management, Tailored To You" - CRM Products Continue to Evolve
"The Ultimate In Distributed Computing" - Avocent Digital Desktops Extend The PCI Bus
"When Software Gets Old" - Maintain A Safe Computing Environment For Your Older Apps
"Updates To The Microsoft Software Assurance Program" - What It Means For IT Managers
"Has Microsoft Won The Mobile Battle?" - Not Just Yet, But Give It Time
"Wireless Hybrid Devices " - Convergence Is The Name Of The Game
"The Data Center Dilemma" - Build Your Own Or Use A Host?
"A Holistic Approach To The Data Center" - Sun?s N1 Grid Initiative Aims To Seamlessly Integrate Infrastructure
"A Buyers? Market" - ISP & Bandwidth Prices Continue To Drop
"Pick Your Vendors Wisely" - It?s A Relationship, Not Just A Product Or Services,
"Connecting The Small Office/Branch Office" - Options For Bridging The Last Mile
"Passwords Are Here To Stay . . . For Now" - Passwords Remain The Primary Form Of Authentication Despite New Technologies
"Wi-Fi Hotspots Taking Over The World?" - Explosive Growth In Wireless Poised To Bring On The Next Technology Boom
"What?s Next For Wireless" - New & Improved Standards Will Ease Security & Interoperability Woes
"The Push For Security" - Windows XP SP2 Aims To Curtail Vulnerabilities
"DIY Or Call In The Pros?" - Monitoring Systems Critical To Operations
The Virtual Bank Vault
Experience Counts
Portable Peril
Hacking at the Speed of Light
It's All About Risk
Cover Your Assets
Encryption is the Key
A New Level of Cyber Badness
Electronic Pedigrees
Everyday Encryption
Food Fight Against NAIS
The More Things Change: Interview with Fred Avolio
Good Security Posture: Interview with Greg Romania
Identity Convergence
Invasion of the Identity Snatchers
Sound Security
Moving Up the Stack
A Contrarian's Viewpoint: Interview with Marcus Ranum
Experience Counts: Interview with Ryan Hicks
REAL ID Backlash
Spyware Among Us
Unified Asset Protection
Under An Assumed Name
Do Not Dig Here
IP Taking the Heat
Portable Peril
The Power of IdM
Security of State: Interview with Bob Maley
Getting a Grip on Cybercrime
Man on a Mission: Interview with Richard Bejtlich
Blended Threats, Unified Response
No Laughing Matter: Interview with E. Kelly Fitzsimmons
Intangible Assets
The Beauty of Awareness: Interview with Ron Clement
Ready for Wireless VOIP?
Protecting enterprise networks from new mobile application downloads
Webmail security: Best practices for data protection
Messaging Security School:Defending mobile devices from viruses, spyware and malware
Webcast: The mobile virus: Coming to your handheld soon?
Technical tip: Expanding antivirus to protect the mobile enterprise
Podcast: Top 5 mobile spyware misconceptions
Expanding antivirus to include the mobile enterprise DNS/DHCP Review: Bluecat Adonis
Unplugged: Wireless IDS/IPS Bake-Off
Controlling the Uncontrollable
SSL VPN Product Review: Array Networks SPX5000
The Antispyware Arms Race
Firewall VPN Product Review:ZyWALL P1
SSL VPN Product Review: Aventail's EX-1500
Hot Pick: Sana Security's Primary Response
Access Management Review: Vernier Networks' EdgeWall 7000 series
Security Appliance Review: SonicWALL's PRO 1260
Wireless Firewall Review: AirMagnet Enterprise 5.0
Wireless Firewall Review: AirTight Networks
The Best: Processes Product Standard: Common Criteria & Vulnerability Reduction: NASA
Uniting Menaces
FedCIRC To Mandate Incident Reports
Book Review-Special Ops: Host & Network Security for Microsoft, UNIX and Oracle
Odyssey Wireless LAN Security Software
OWASP Buzzing About Security
ISPs Shutting Off the Tap
Information Anarchy?
War Driving
Doctor, Doctor
PDA Defense v2.01
Spam & Virus Writing May Come Under Mafia Control
Canning Spam with Algorithms
Princeton Hacks Yale's Admissions
Open-Source Hacker Posts White Paper on Linux Malcode
Electronic Tax Returns A Tempting Target
Hardeded OSes Boost e-Commerce Security
KickFire 2.0 Review
eRoom 5.0 Review
AuctionBuilder 1.0 Review
Blaxxun 1.0 Review
Collaboration at Warp Speed
Enterprise Extensions Review
Talisma Review
Punch WebGroups Review
© Copyright 1988-2018 Sandra Kay Miller- All rights reserved.
Wireless Security
The Trusted OS Makes a Comeback
Aspect-Oriented Programming Takes Aim at Software Complexity
Slamming the Door on Full Disclosure
Colocation: Finding the Right Site
Tools & Techniques for Managing Your Team in a Global Environment
Who's Watching the Shop; Application Monitoring Products
Business as Usual in the Face of Adversity: Disaster Recovery
Moving Your Data Center: Mission Possible
Real People: The Pampered Chefs
Cost Effective Security
Coming Soon: Sound Unseen--Ultra-thin Audio
Coming Soon: What's Cooking--Tonight's Menu Stove/Refrigerator Appliance
Unplugged: Moveable Music
Quick Bytes: Homegrown TiVo