Stories by Neal Weinberg

  • Is SDN your next security nightmare?

    The big buzzword in networking these days is Software-Defined Networking (SDN), a de-coupling of the data plane and the control plane that allows you to manage physical devices via a software-based controller sitting on a general purpose server.

  • 10 top tests of 2013

    Network World tested hundreds of products in 2013, but here are our top 10 tests of the year. In order to make the list, the product review had to be a comparative test of multiple products in a single category and it had to break new ground or deliver fresh insight into an important product area.

  • Gartner: The cloud according to Daryl

    Orlando -- Gartner Managing Vice President Daryl Plummer, the master of the concise, astute observation, delivered his annual 'state of the cloud' report Wednesday at the company's Symposium. Here are his six key points:

  • How to blunt spear phishing attacks

    According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to.

  • 'You have to be masochist to be an IT person': FedEx CIO

    ORLANDO -- "You have to be a masochist to want to be an IT person,'' says Robert Carter. And he would know. Carter is the soft-spoken, hard-driving CIO who has been fighting for the past 11 years to transform IT operations at FedEx, where "the planes don't fly and trucks don't roll without IT services.''

  • Gartner recommends 20 ways to cut IT costs

    In tough economic times, all enterprise departments are required to tighten their belts. To help IT execs navigate through the cost-cutting maze, Gartner analysts Wednesday presented a list of 20 ways that IT execs can slash expenses.

  • INTEROP - Cloudy picture for cloud computing

    You can call it <a href="http://www.networkworld.com/news/2008/031108-eleven-cloud-computing-vendors-to.html">cloud computing</a>. You can call it grid computing. You can call it on-demand computing. Just don't call it the next big thing -- <a href="http://www.networkworld.com/supp/2008/ndc1/021808-ndc-power-future-look.html">at least not yet</a>.

  • Two-factor authentication: Hot technology for 2008

    We've known for a long time that requiring just a user name and password to get on the network or to access personal information on a Web site isn't the tightest security posture, but there weren't a lot of good alternatives, and there wasn't that much pressure to change.

  • NAC: Hot technology for 2008

    IT execs want to make sure that users don't come back from a business trip and infect the entire company. IT execs want to make sure contractors with visitor access to the network aren't able to do damage or get access to confidential information. And IT execs want to make sure that users are properly authenticated and that they only access applications they need to do their jobs.