Speed traps

Newman, David
January 2006
Network World;1/16/2006, Vol. 23 Issue 2, p42
Trade Publication
The article examines the results of the scalability tests conducted to Web front-end devices. The scalability tests demonstrated the limits of system performance in terms of maximum concurrent-connection capacity, Transmission Control Protocol (TCP) multiplexing ratios, and maximum forwarding rates. In all these areas, the test results showed big differences among devices. TCP multiplexing, the ratio of client-side to server side TCP connections, may depend on think time. Think time is the amount of time users wait between requests.


Related Articles

  • Digging out new rootkits. Radcliff, Deb // Network World;9/26/2005, Vol. 22 Issue 38, p92 

    This article discusses the use of rootkits, favorite attacker tools for compromising computer systems without detection. Rootkits has again begun percolating among security experts. Rootkits are not new, they have been around for more than a decade, first on Unix and then primarily targeting...

  • Continuous protection. Hope, Michele // Network World;12/26/2005, Vol. 22 Issue 51, p34 

    The article focuses on the benefits offered by continuous data protection (CDP) tools to early adopters. CDP products record any changes made to a specific file or to an application's underlying block-based data in real time. They are fueled by database applications that record ongoing changes...

  • CDP virtues.  // Network World;12/26/2005, Vol. 22 Issue 51, p34 

    The article cites some of the advantages of continuous data-protection (CDP) tools. CDP makes application data more available by eliminating the back-up window required by traditional back-up software. It also offers one of the lowest recovery-point objectives for restores and allows rapid and...

  • Is 'security in the cloud' the way to go? Miller, Brad; Schneier, Bruce // Network World;2/13/2006, Vol. 23 Issue 6, p42 

    The article presents a debate between two information technology experts on whether outsourced security services are better than customer premises equipment (CPE)-based systems. On the affirmative side, Brad Miller of Perimeter Internetworking said that managed CPE represents the old way of...

  • No funnies in recent edition of Boston Globe. Karp, Mike // Network World;2/13/2006, Vol. 23 Issue 6, p51 

    The article relates a case of data security lapses at the newspaper "The Boston Globe." The newspaper acted quickly once it realized its error, alerting the public and credit companies involved, giving the story page one coverage, and setting up a hotline for its subscribers. This is a marked...

  • Security titans ready for showdown at RSA. Messmer, Ellen; Greene, Tim; Hochmuth, Phil; Fontana, John // Network World;2/13/2006, Vol. 23 Issue 6, p1 

    The article reports on the emphasis on network-access control and security-policy enforcement at the RSA Conference 2006 in the U.S. Organizers estimate that the event will draw 14,000 attendees and more than 300 exhibitors. Keynote speakers are composed of prominent chief executive officers in...

  • IPMI V2.0 simplifies server mgmt. Saito, Marcio // Network World;5/9/2005, Vol. 22 Issue 18, p35 

    The article explains how Version 2.0 of the Intelligent Platform Management Interface (IPMI) specification simplifies the task of server management. Version 2.0 is supported on many rack-optimized servers and blade computing platforms. Servers with IPMI functionality let network administrators...

  • Prepare for attack. Cox, Graeme // SC Magazine: For IT Security Professionals (UK Edition);Nov2006, p51 

    This article points out that time and expertise are key to achieving the goal of operating securely online. Data from the CERT Coordination Centre in Great Britain reveal that the number of reported security incidents is still rising despite an annual increase in IT security spending of 50...

  • Military clamping down on security. Messmer, Ellen // Network World;1/16/2006, Vol. 23 Issue 2, p8 

    The article reports on the move of the top commander for the U.S. Department of Defense (DoD) network operations to order a crackdown on computer security. This decision arises amid growing concern about hacker infiltrations into military computers. A cleanup is under way of all DoD networks to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics