TITLE

Easing the load at the edge

AUTHOR(S)
Rash, Wayne
PUB. DATE
March 2003
SOURCE
InfoWorld;3/24/2003, Vol. 25 Issue 12, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents advice on selecting and using several types of information technology products. Capabilities of edge appliances; Factors to consider in implementing computer security and management devices; Tips on the use of applications for performance enhancement and traffic management.
ACCESSION #
9364311

 

Related Articles

  • Security and Privacy.  // Caribbean Business;2/27/2001, Vol. 29 Issue 8, p34 

    Discusses the implications of information technology for computer security. Common concerns on computer security of Internet users; Risks associated with the increasing availability of financial information online; Security and privacy issues needed to be addressed by information technology...

  • Easing the load at the edge. Rash, Wayne // InfoWorld;3/24/2003, Vol. 25 Issue 12, p40 

    Presents advice on selecting and using several types of information technology products. Capabilities of edge appliances; Factors to consider in implementing computer security and management devices; Tips on the use of applications for performance enhancement and traffic management.

  • IT raises security concerns. Koblentz, Evan // eWeek;6/24/2002, Vol. 19 Issue 25, p46 

    Reports the attention of information technology on security in the U.S. Plan of Acxiom Corp. to change file ID and passwords on the Fibre Channel switches and to patrol with an exclusive-access encrypted database; Weakness of storage area networks; Impact of the proliferation of Fibre Channel...

  • IT Pragmatics: Thinking About Your Next Virus Attack and Optimum Digital Health. Williams, Jeff // Public Manager;Spring2002, Vol. 31 Issue 1, p61 

    Focuses on information technology (IT) pragmatics. Way of achieving an optimal digital condition; Designation of people to monitor computer security issues; Assessment of risks to IT.

  • A Practical Approach to Enterprise IT Security. Liu, Simon; Sullivan, John; Ormaner, Jerry // IT Professional;Sep/Oct2001, Vol. 3 Issue 5, p35 

    Discusses a practical approach to enterprise information technology security. Increase of security incidents; Increase of financial loss; Security framework; Multidimensional security mechanisms. INSET: Lessons Learned about Building a Security Architecture..

  • SECURITY PART II: SOLUTIONS. Yager, Tom // InfoWorld;8/26/2002, Vol. 24 Issue 34, p41 

    Highlights the results of the 2002 InfoWorld IT Security Survey. Most valuable information from Web sites or newsletters; Web sites the offered security information; Other findings of the survey.

  • COUNTERING THE GREATEST FEARS. Rash, Wayne // InfoWorld;8/26/2002, Vol. 24 Issue 34, p42 

    Comments on the common computer security fear of information technology (IT) managers. Basis of security requirements; Security concerns of IT managers; Views of IT managers on the importance of antivirus.

  • The Sixth Degree. McKendrick, Joe // Database Trends & Applications;Apr2003, Vol. 17 Issue 4, p14 

    Offers advice on developing an organization-wide strategy for handling security issues related to information technology (IT). Risks posed by the increasing connectivity of information systems; Pressure faced by data center and IT managers to show return on investment from technology acquisitions.

  • Security can no longer be an afterthought. LaMonica, Martin // InfoWorld;8/13/2001, Vol. 23 Issue 33, p14 

    Deals with the security issues facing the information technology industry. Challenge posed by computer security; Key elements in addressing application design issues; Survey results on consumer confidence on the safety of the Internet.

Share

Read the Article

Other Topics