Tech Analysis

Recent Articles

  • Does a SAN File System Fit the Bill?

    With storage needs growing exponentially in virtually every industry today, many organizations have jumped on the storage and server consolidation bandwagon, installing NAS (network-attached storage) systems to manage their growing needs. But for some, this method has become increasingly inefficient as more servers are added throughout the organization, making the process more complex and unwieldy.…

  • Putting Products to the Security Test

    Effective security testing of new IT products is constrained by staff shortages, inadequate equipment and crunched time—in short, by a scarcity of resources. But even with all these hurdles, security testing can—and should—be done and done well. eWEEK Labs has access to some of the most advanced test gear, expertise and vendor support available, but…

  • Building a Safer PC

    When it comes to building PCs for your customers, you have a couple of choices. You could preload the computers with just the bare basics. That’s what the mass-market retailers do, and they make some money from PC sales—not a lot, but some. Or, you could preload your customers’ PCs properly so that their machines…

  • Fall Processor Forum 2004 Wrap-Up

    We trust you’ve read all of Mark Hachman’s excellent news reports located in our Fall Processor Forum main page. Mark provided insights on the upcoming AMD dual-core Opteron, Transmeta’s just-released TM8800 (aka “Efficeon 2”), and VIA/Centaur’s 64-bit-capable “CM” processor due in early 2006, along with various embedded processor news. In this wrap-up report, we’ll discuss…

  • Inside the JPEG Virus

    The Watch The end of summer lull for viruses and worms continues. We’re still seeing new versions of RBots, and a new Bagle, but nothing with teeth. The big news appears to be the anticipation of a viral exploit of the JPEG vulnerability that Microsoft patched earlier this month. Within days of the release of…

  • App Developers Need to Redouble Security Efforts

    PHOENIX—Most enterprise developers can recite various software architecture layers as though it’s the easy question on the computer science final exam: operating system, application server, Web server, database server, application, network. Providing security at each of these levels is important, and traditionally accountability lies with the network and production staff. However, a few new statistics,…

Subscribe for updates!

This field is required This field is required