Stories by Neal Weinberg

How to build the immortal data center

If your data center is reaching capacity and you're thinking about cracking open the corporate piggy bank to fund a new data center, stop right there.

Gartner: The cloud according to Daryl

Orlando -- Gartner Managing Vice President Daryl Plummer, the master of the concise, astute observation, delivered his annual 'state of the cloud' report Wednesday at the company's Symposium. Here are his six key points:

How to blunt spear phishing attacks

According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to.

'You have to be masochist to be an IT person': FedEx CIO

ORLANDO -- "You have to be a masochist to want to be an IT person,'' says Robert Carter. And he would know. Carter is the soft-spoken, hard-driving CIO who has been fighting for the past 11 years to transform IT operations at FedEx, where "the planes don't fly and trucks don't roll without IT services.''

Gartner recommends 20 ways to cut IT costs

In tough economic times, all enterprise departments are required to tighten their belts. To help IT execs navigate through the cost-cutting maze, Gartner analysts Wednesday presented a list of 20 ways that IT execs can slash expenses.

INTEROP - Cloudy picture for cloud computing

You can call it <a href="http://www.networkworld.com/news/2008/031108-eleven-cloud-computing-vendors-to.html">cloud computing</a>. You can call it grid computing. You can call it on-demand computing. Just don't call it the next big thing -- <a href="http://www.networkworld.com/supp/2008/ndc1/021808-ndc-power-future-look.html">at least not yet</a>.

Data leakage prevention: Hot technology for 2008

How hot is the data leakage prevention market? Well, if the big boys like Cisco, Symantec, McAfee and Trend Micro are snapping up DLP start-ups to the tune of US$1.6 billion in 2007, there must be a reason.

Two-factor authentication: Hot technology for 2008

We've known for a long time that requiring just a user name and password to get on the network or to access personal information on a Web site isn't the tightest security posture, but there weren't a lot of good alternatives, and there wasn't that much pressure to change.

NAC: Hot technology for 2008

IT execs want to make sure that users don't come back from a business trip and infect the entire company. IT execs want to make sure contractors with visitor access to the network aren't able to do damage or get access to confidential information. And IT execs want to make sure that users are properly authenticated and that they only access applications they need to do their jobs.

[]