X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 vp network


Symantec Swallows AXENT; Takes on Network Associates
Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

vp network  sales efforts. Greg Cottichio, VP of Marketing for AXENT states that Customers are looking for fewer vendors to be involved in their network infrastructure. With that in mind, this merger gives the new company the potential to be the #1 leader in products and services in the security marketplace. Initially no one from management of either company will be stepping down. John Becker, current CEO of AXENT will be staying on to assist John Thompson, Symantec CEO, in the transition. According to Mr. Cottichi

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, IT Infrastructure

The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical types of activities that these providers perform include data center operations; network operations; backup/recovery services, data storage management services; system administration services; end user support of desktop PCs, laptops, and handheld devices; web site, or application hosting, etc.  

Evaluate Now

Documents related to » vp network

Google Acquires Smart, Connected Products Manufacturer Nest


Google has announced that it has entered into an agreement to buy smart device manufacturer Nest Labs for $3.2 billion (USD) in cash. Now the future of smart, connected products takes on an entirely new twist with Google strongly in the mix.

vp network  Rogers, Nest’s founder and VP of Engineering answered key questions for Nest customers on a Q&A on the Nest blog : Will Nest continue to support iOS so I can have the Nest app on my iPhone or iPad? Yes, absolutely. We’ll continue support iOS, Android and modern Web browsers so you can check in on your home and control the temperature from wherever you are.   Will Nest and Google products work with each other? Nest’s product line obviously caught the attention of Google and I’m betting that there� Read More

TurtleSpice ERP! (Week 7)


Welcome to Week 7 of TurtleSpice ERP! We’re following one company’s software selection process, from beginning to end—with a twist: It’s up to you to make sure comptroller Mike Chelonia stays on track and selects the right ERP system for the company. Cast your vote at the bottom of this post, and next week I’ll move the scenario forward based on the winning answer.The story so far: Mike

vp network  Facing pressure from his VP Wade Sharkey to short-circuit the selection process and select Big Gun Software, Mike gets a reprieve when Wade Sharkey is over-ruled by the CEO . When supply issues threatened to derail the entire ERP selection project , Mike pushed ahead anyway with his goal of documenting business requirements for software selection. Last week , TurtleSpice finally reached the RFI stage of the process. As often happens during the software selection process, one vendor asked for an Read More

Ariba to Leave Integration to Specialists


E-purchasing vendor Ariba chooses Tibco Software to integrate back-end programs.

vp network  but according to Ariba VP Dave Rome, the use of specialists such as Tibco will be more efficient. Market Impact Together with recent partnerships agreements with Siebel and InterWorld Ariba is giving every indication of having chosen to focus its resources on its core business, the creation of catalog-based marketplaces. While there is no reason to expect any fundamental changes in Ariba's product capabilities in the near future as a result of this announcement, there are two important results. First, if Read More

Performance Management Simplified by MSPs


IT infrastructure consisting of networks, servers, databases, and even parts of application systems forms a networked computing system (NCS) whose performance must be actively managed to ensure continual business support. But the skills and tools necessary to ensure that network and server systems provide adequate levels of services and performance are expensive and scarce. Management service providers (MSPs) that specialize in performance management can apply expert personnel and 24/7 monitoring at a fraction of the cost required to staff the function internally.

vp network  Author Jim Dowling is VP of the Alignment Consulting Practice at TechnologyEvaluation.Com, Inc. located in Woburn, Massachusetts. TEC researches IT products and suppliers as well as the ways companies obtain business value from IT. TEC's consulting services remove time, risk and ultimately cost from IT related decisions. Jim can be reached at jdowling@TechnologyEvaluation.COM . Read More

Defense in Depth: Comprehensive Security with Authenticated Network Access Control


The greatest threat to the security of the modern network is complexity. Threats to network security almost always play on missed details in the design of a network or a piece of software. These overlooked details enable much larger and potentially devastating security breaches to occur. However, this threat can be countered with a well designed network and vigilant safeguards.

vp network  in Depth: Comprehensive Security with Authenticated Network Access Control The greatest threat to the security of the modern network is complexity. Threats to network security almost always play on missed details in the design of a network or a piece of software. These overlooked details enable much larger and potentially devastating security breaches to occur. However, this threat can be countered with a well designed network and vigilant safeguards. Read More

Fundamental Principles of Network Security


As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols.

vp network  Principles of Network Security As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols. Read More

The Roaring Penguin Training Network


A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).

vp network  Roaring Penguin Training Network Roaring Penguin's CanIt® software solutions will stop spam before it reaches your mail server. CanIt products provide per user Bayesian analysis including access to the RPTN Bayesian training database. Source: Roaring Penguin Software Resources Related to The Roaring Penguin Training Network : Bayesian Spam Filtering (Wikipedia) Email Filtering (Wikipedia) The Roaring Penguin Training Network Bayesian E-mail Filtering is also known as : Bayesian Approach to Filtering Read More

Microsoft Tech Ed 2000 Win2K Attendee Network Fails Miserably


While sitting at one Windows 2000 desktop we waited a solid five minutes just to complete the logon process only to find that the wide area network speeds and feeds were so poor as to make the entire process pointless.

vp network  Tech Ed 2000 Win2K Attendee Network Fails Miserably Microsoft Tech Ed 2000 Win2K Attendee Network Fails Miserably P. Hayes - June 12, 2000 Event Summary ORLANDO, FLA Microsoft Tech Ed Conference. Microsoft Conference attendees were plagued with shared computer access issues on the Microsoft prepared and installed Windows 2000 professional Network which utilized Compaq Pentium III Deskpros. Attendees were assigned an id# and password from which they could access e-mail, conference events and web Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control


Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

vp network  on a combination of VPN tunnels, private networks, extensive firewall rules, or host access tables. Replicate infrastructure - Many organizations basically replicate their computing environment within a demilitarized zone (DMZ) . Create custom extranets - Working within the application itself or building complex web, specific applications can be provisioned for external access. Embrace web-based applications - Software as a Service (SaaS) offerings move the application to a hosted provider, alleviating Read More

Network Engines, Inc. - Double the CPUs for Web Serving


Network Engines, Inc. is a leading vendor of extremely thin rackmount servers used in the rapidly growing area of web serving. In this note, we examine the company and its outlook.

vp network  Engines, Inc. - Double the CPUs for Web Serving Vendor Genesis Network Engines, Inc. (NEI) was formed in 1997 as an IP content delivery-focused vendor. The founder was Lawrence Genovesi, who continues to run the company as President. The original product was a multi-processor server targeted at streaming media providers. In 1998, the company shifted its focus to clustered server products, based on the belief that Internet growth would lead to the need for scalable, cost-effective servers. NEI's Read More

Customer Relationship Management and the Next Generation Network


Next generation networks may eventually allow us to interact with the world in a way compatible with how we live. This would have the greatest impact on our ability to add value to the people we do business with.

vp network  Relationship Management and the Next Generation Network A few months ago I was heading back to the office to receive a very important call from a prospect about a huge business opportunity. Unfortunately a serious family situation caused me to head across town instead. Thankfully, the family situation came to a happy conclusion, but the business situation didn't. Like most everybody else, a great deal of my time is spent on the road. I'm meeting clients and prospects, running seminars and Read More

Network Associates RePositions Itself as a Security E-Village


With a new organizational strategy, Network Associates hopes to retain and recruit savvy security engineers and leverage the hot IT security market for outside funding and a type of web-based CIO Helpdesk.

vp network  Associates RePositions Itself as a Security E-Village Event Summary Security monolith, Network Associates, Inc. (Nasdaq: NETA) has reorganized itself to become a holding company of four independent security subsidiaries: PGP Security, Sniffer Technologies, Magic Solutions, and McAfee Corporation which spun off with its own IPO last December. Each of the four divisions stand to hire their own CEO or president to lead the strategic developments of their respective organizations. On top of the new Read More

Standardized Battlespace SOA: Enabling Network-centric Operations


Network-centric operations (NCO) provide the ability to leverage information networks to generate a more dynamic and agile decision-making space. A fundamental enabler is service-orientated architecture (SOA). The use of industry-standard IT architectures helps ensure that systems can be provisioned rapidly, shared as appropriate, and give the flexibility and response times needed within such challenging environments.

vp network   Read More