Data Center

Data Center / Most Commented

IRMA Threatens Irish ISPs

I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more

Designing Secure Networks with Cisco Technology, Part 3

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more

Data Breach Costs Continue to Rise, 40% Increase Since 2005

According to a new study by PGP Corporation and Ponemon Institute, data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007. The study is based on 43 organizations across 17 different industry sectors with a range of 4,200 to 113,000 records that were affected. It is also noted that since 2005, the cost component has grown by more than $64 on a per victim basis since -- nearly a 40% increase. more

X-Force Report: Corporations Becoming No. 1 Security Threat to Their Own Customers

With the alarming increase in cyberattacks, criminals are literally turning businesses against their own customers in order to steal consumer's personal data, warns the latest annual X-Force Trend and Risk report from IBM. "The security industry puts a lot of effort into the technical evaluation of security threats, examining, sometimes at great length, the potential threat that each issue might present to corporations and consumers. Criminal attackers out for profit, however, have considerations that the security industry does not always take into account, such as monetization cost and overall profitability." more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more

An Interview With Richard Whitt, Google’s Washington Telecom and Media Counsel

I recently had the opportunity to interview, Richard Whitt, Google's Washington Telecom and Media Counsel, who will be one of the keynote speakers at the upcoming Emerging Communications Conference (eComm 2009) being held on March 3-5 at the San Francisco Airport Marriott. The following is the transcript of our phone conversation and the audio recording of the interview. more

Sun’s New Green Data Centre Expected to Save $1 Million a Year

Responding to market demand for more energy-efficient datacenters, Sun Microsystems, Inc. has announced the completion of its new Broomfield, Colo. datacenter. The largest datacenter consolidation project undertaken in the company's history is expected to save more than $1 million in electricity costs and 11,000 metric tons of CO2 per year in Broomfield. The new Broomfield datacenter follows similar Sun projects completed in Blackwater, UK, Santa Clara, Calif. and Bangalore, India in August 2007. more

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more

Network Solutions Under Large Scale DDoS Attack, Millions of Websites Potentially Unreachable

Network Solutions is having problems with "all" its name servers, according to their tech support and a recent post on North American Network Operators' Group (NANOG) mailing list indicates that it has been under very large-scale UDP/53 DDoS attack for the last 48 hour period. As a result, domain names hosted with Network Solutions' Worldnic have been affected. Network Solutions is one of the leading domain registrars and DNS hosting providers in the world, managing more than 7.6 million domain names. more

Report on Possibly the Largest Data Breach Ever

Amidst all the recent reports of data breaches, Gunter Ollmann of IBM Internet Security Systems, has reported today about one particular case which may be the largest data breach to date. Ollmann wirtes: "The media has been full of analysis concerning data breaches over the last couple of weeks, mostly related to the uptick in 2008 reports. While much of this increase can be accounted for by the wider adoption of state legislation that mandates companies to publicly disclose their data breaches, I think it is worth pointing out today's latest disclosure -- which is quite probably the largest breach ever." more

TV Warehousing: Comcast’s 500-Terabyte Storage Development for Advanced Advertising

Comcast has sketched out plans for a gigantic database called "TV Warehouse," able to store a full year of statistics gathered from digital set-tops in more than 16 million households nationwide, according to an industry executive familiar with the project. TV Warehouse, envisioned as having a massive 500 Terabytes of storage, would then feed up to a database even broader in scope operated by Canoe Ventures, the advanced-advertising venture formed by Comcast and five other large MSOs. more

Microsoft Reveals Gen 4 Modular Data Center Strategy, Calls it Most Revolutionary in 30 Years

In a blog post today, Microsoft has provided details of its Generation 4 Modular Data Center plan, which the company believes to be the foundation for its cloud data center infrastructure in the next five years. Michael Manos, Microsoft's General Manager of Global Foundation Services, responsible for the global data center design writes: "We believe it is one of the most revolutionary changes to happen to data centers in the last 30 years..." more

Who is Responsible in Our Cloudy World?

A number of large technology companies, including Google, Microsoft and Yahoo!, have announced that they have signed up to a voluntary code of conduct on how they do business in countries that curtail freedom of expression like China and Singapore... It's not surprising to see this sort of self-regulation being proposed as otherwise political initiatives like the Global Online Freedom Act, passed in one US Senate committee but currently floating in legislative limbo, could actually make it into law. more