|
Opus One staff spend a significant amount of their time researching current and bleeding-edge technologies for our clients. As part of this research and analysis program, we also publish the results of our research in leading journals and trade publications. Where possible, we've made these articles available to you here. Feel free to browse and learn from our experience. However, remember that all these articles are copyright and you may not republish or redistribute them without permission. Warning: Many of the links here go either to extracts which have been copied to the Opus One local server or to servers run by the trade publications themselves. Most of these should work, but there are continuation links (for example, from an article in MacWorld to other related material on the MacWorld server) which either never did work here or which may decay over time to uselessness. We can't guarantee that all the links will work all the time. In general, you will have to "back out" of these articles by pressing the back button on your browser.
ContentsThis document is in the process of being updated; articles are not fully current. For best results, use a search engine to find what you are looking for.
BooksMacWorld Networking Bible, IDG Books, 1994, 687 pages. (with Dave Kosiur) (Table of Contents)Internet Security Professional's Reference, 2nd edition Macmillan Computer Publishing, 1997. (Brief Description) "A Hitchhiker's Guide to Computing," University of Arizona, Tucson, Arizona, August, 1988, 145 pp. (second edition published August, 1989, 179 pp.)
2007."Exchange upgrade earns mixed grades", Network World, January 8, 2007, Vol.24. "Check Point delivers long-awaited appliance", Network World, February 5, 2007, Vol.24. "Not investing in training", Network World, March 7, 2005, Vol.22. "Armed with open source",Computer World, March 2007, Vol.24. "NAC enforcement tools fall short", Network World, April 30, 2007, pp.32-33. "What can NAC do for you now?", Network World, April 30, 2007, pp.27. "NAC authentication with XP clients is a snap", Network World, April 30, 2007, pp.27-32. "Symantec's Enterprise Vault finds what you're looking for", Network World, June 11, 2007, pp.27. "6 tips for selecting the right all-in-one NAC product", Network World, July 30, 2007, pp.42. "The benefits and short-comings of NAC ", Network World, September 3, 2007, pp.10. "UTM firewalls: Ready for the enterprise", Network World, September 3, 2007, Vol.24, pp.35-36. "Top trends in enterprise UTM market", Network World, September 3, 2007, Vol.24, pp.36. "How to select enterprise UTM firewalls", Network World, September 3, 2007, Vol.24, pp.38-40. "Five tips on deploying enterprise UTM", Network World, September 3, 2007, Vol.24, pp.38. "Seven Secrets to NAC Success", STATETECH, October-November 2007, pp.9-11. "Are stand-alone IPSs dead?", Network World, October 1, 2007, pp.28. "Complete guide to e-mail security", Network World, October 15, 2007, pp.46. "SonicWALL TZ 180W", Network World, October 2007, pp.58. "Top Trends in the Enterprise Messaging Security market ", Network World, October 15, 2007, pp.46. "Messaging Security : How does it work? ", Network World, October 15, 2007, pp.48-50. "How to buy a new messaging-security product? ", Network World, October 15, 2007, pp.50-51. "Tips for testing messaging-security gateways", Network World, October 15, 2007, pp.51-52. "Best practices for implementing messaging security", Network World, October 15, 2007, pp.52. "All-in-one' firewalls fall short", Network World, November 12, 2007, Vol.24, pp.32. "UTM performance takes a hit", Network World, November 12, 2007, Vol.24, pp.34-40. "Juniper, Cisco all-in-one devices hit on intrusion-prevention controls", Network World, November 12, 2007, Vol.24, pp.40-42. "AV's place is not in the all-in-one security box", Network World, November 12, 2007, Vol.24, pp.46-48. "Check Point's UTM management falters; Cisco, Juniper gain", Network World, November 12, 2007, Vol.24, pp.48-50. 2006"Barbarians at the gate", Network World, January 9, 2006, Vol.23, pp.34-35. "OptiVault reduces the need for magnetic tape backup", Network World, January 30, 2006, Vol.23, pp. 47. "Extend perimeter defense to application layer", Network World, January 23, 2006, pp. 39. "Test shows VoIP call quality can improve with SSL VPN links", Network World, February 2, 2006, pp. 56-57. "Juniper/NetScreen deal bears fruit", Network World, February 6, 2006, Vol.23. "Not Your Father's Firewall", Biztech, March, 2006, pp.17-18. "ZyXel offers unified threat management for low-end net",Network World, March 06, 2006, Vol.23, pp.42. "What is NAC anyway?",Network World, April 3, 2006, Vol. 23, pp.39. "The competition for NAC",Network World, April 3, 2006, Vol. 23, pp.39-42. "When a product is better than the company", Network World, April 10, 2006, pp.43. "End-to-end NAC remains difficult", Network World, May 1, 2006, pp.42-46. "Cisco hits on firewall/VPN, misses on ease of use", Network World, May 1, 2006, pp.50-51. "The pros and cons of NAC", Network World, June 12, 2006, pp.33. "Sourcefire, Tenable seek vulnerabilities passively", Network World, July 31, 2006, pp.37-38. "Security event management, no strings attached", Information Security, August 4, 2006 pp.57. "Cymphonix device watches users, traffic, but hits a few bumps", Network World, August 7, 2006, pp. 40. "The NAC train is leaving the station", Network World, August 28, 2006, pp. 49. "Not investing in training", Network World, August 28, 2006, pp. 54. "Conflicts lead to tense times in security", Network World, November 6, 2006, pp. 31. "ConSentry edges out Nevis in in-line NAC appliance test", Network World, December 4, 2006, pp. 58-62. 2005"Mobile models lost in translation", Network World, February 21, 2005, pp.55. "Juniper scores with WLAN protector", Network World, March 7, 2005, Vol.22. "X Games", Network World, April 4, 2005, pp. 36-38. "Switching into overtime", Network World, April 4, 2005, Vol.22, pp. 38. "SonicWall's PRO 1260 Enhanced offers flexibility at the low end", Network World, April 4, 2005, Vol.22,pp. 39. "Symantec slows spam at the edge ", Network World, April 11, 2005, pp. 56. "The security status quo is wrong", Network World, April 25, 2005, pp. 51. "Advanced SIP interoperability is slow in the making", Network World, May 2, 2005, pp. 42-56. "Check Point's VPN-1 Edge W security device picks up wireless support ", Network World, May 30, 2005, pp. 40. "Tale of the tape: Encrypt data now", Network World, July 4, 2005, pp. 13. "De-perimeterization: Jericho Forum misses the mark", Network World, August 15, 2005, pp. 17. "Sourcefire may resurrect Check Point", Network World, October 31, 2005, Vol.22, pp. 47. "Juniper's chassis combines firewall, VPN and IPS", Network World, December 5, 2005, Vol.22, pp. 56-58. "SSL VPNs dissected", Network World, December 19, 2005, Vol.22, pp. 36. "SSL VPN interoperability across applications proves tricky", Network World, December 19, 2005, Vol.22, pp. 36-42. "Access-control products show wide range", Network World, December 19, 2005, Vol.22, pp. 42-43. "What's on the PC, Mac?", Network World, December 19, 2005, Vol.22, pp. 43-45. 2004"Securing endpoints in SSL VPNs", Network World, January 6, 2004, pp.51. "SSL VPN gateways", Network World, January 12, 2004, Vol. 21, pp.43-46. "SSL terms and conditions", Network World, January 12, 2004, Vol. 21, pp.44. "Time to wise up about worms", Network World, February 2, 2004, pp. 67. "An ounce of intrusion prevention may cure your network security ills", Network World, February 16, 2004, pp. 69. "Go with the flow", Network World, February 16, 2004, pp. 70. "Content is king", Network World, February 16, 2004, pp. 72. "ForeScout pitches honeypot technology as IPS", Network World, February 16, 2004, pp. 73. "Shine On (and On)" , Wired Magazine, March 2004. "Advanced Screening", Information Security, March 2004, pp. 32. "About This Review", Information Security, March 2004, pp. 32. "Testing shows VoIP a big winner", Network World, April 26, 2004, pp. 53. "Inkra Networks' 1518TX Virtual Service Switch", Network World, April 05, 2004, pp. 51. "SIP aces basic interop tests", Network World, May 10, 2004, pp. 58-62. "Dialing for VoIP dollars", Network World, May 10, 2004, pp. 60. "SIP terms", Network World, May 10, 2004, pp. 60. "Inflated Image", Information Security, July 2004, pp.53-57. "Sourcefire's RNA provides instant visibility into your network", Network World, August 8, 2004, pp. 63-64. "A VoIP security plan of attack", Network World, September 13, 2004. "Cracking the wireless security code", Network World, October 4, 2004, Vol. 21. "Security picks", Network World, October 4, 2004, Vol. 21, pp. 47. "WEP: Stick a fork in it", Network World, October 4, 2004, Vol. 21, pp. 47. "Glossary of wireless security terms", Network World, October 4, 2004, Vol. 21, pp. 48. "802.1X: A stepping stone", Network World, October 4, 2004, Vol. 21, pp. 48-50. "Security standards aside, lock down your boxes, boys!", Network World, October 4, 2004, Vol. 21, pp. 52. "WPA - An accident waiting to happen", Network World, October 4, 2004, Vol. 21, pp. 50-52. "802.11i: The next big thing", Network World, October 4, 2004, Vol. 21, pp. 52-56. "How to do it: Securing your wireless LAN", Network World, October 4, 2004, Vol. 21, pp. 54. "Tools, not standards, that help tie down wireless nets", Network World, October 4, 2004, Vol. 21, pp. 54-56. "SIMplicity", Information Security, November 2004, pp. 34-44. "SIMs in Action", Information Security, November 2004, pp. 42. "Spam in the Wild, The Sequel ", Network World, December 20, 2004, Vol. 21. "Top spam fighters offer feature diversity", Network World, December 20, 2004, Vol. 21, pp. 34-38. "Adventures in spam testing", Network World, December 20, 2004, Vol. 21, pp. 36. "Why our numbers work", Network World, December 20, 2004, Vol. 21, pp. 37. "Where's SpamAssassin?", Network World, December 20, 2004, Vol. 21, pp. 38. 2003"Attacking spam at the network's edge", Network World , February 24, pp. 42-44. "How Vulnerable?", Information Security, March 2003, pp. 32-44. "VULNERABILITY ANALYZERS", Information Security, April 2003, pp. 90. "Risk Analysis Needs a Reality Check", Network World , April 14, 2003, vol. 20, no. 15, pp. 33. "Wireless Security and 802.1X Interoperability", Network World, April 28, 2003, pp. 63--66. "The big-picture view on product testing", Network World, May 26, 2003, pp. 67. "Turning the Network Inside Out", Information Security, June 2003, pp. 28-42. "SSL VPNs won't save the world", Network World, June 9, 2003, pp. 43. "What is an IPS, anyway?", Network World, August 4, 2003, pp. 41. "Ear Buddies" , Wired Magazine, September 2003. "We throw real traffic at 16 anti-spam products", Network World, September 15, 2003, pp. 39. "Do these numbers work for you?", Network World, September 15, 2003, pp. 42. "Spam and statistics", Network World, September 15, 2003, pp. 44. "When will we ever learn?", Network World, September 29, 2003, pp. 43. "IDS finds niche as analytical tools", Network World, October 13, 2003, Vol. 20, Number 41. "What network IDSs can - and can't - do", Network World, October 13, 2003, Vol. 20, Number 41, pp. 48. "False positives remain a major problem", Network World, October 13, 2003, Vol. 20, Number 41, pp. 50. "Equipped to play", Network World, October 13, 2003, Vol. 20, Number 41, pp. 52. "Diane Greene is my hero", Network World, October 27, 2003, pp. 58. "Avocent hits home with new KVM", Network World, November 11, 2003, pp. 40. "CCM Version 2 eases Nortel VPN management", Network World, November 3, 2003, pp. 48. "NetScreen's Global Pro 3", Network World, January 7, 2002, vol. 19, no. 5, p. 12. "Cisco VPN/Security Management Solution", Network World, February 4, 2002, vol. 19, no. 5, p. 22. "Integrating the 'Net into net mgmt.", Network World, February 11, 2002, pp. 33. "Everything you need to know about Intrusion Detection Systems", Network World, April 8, 2002, vol. 19, no. 14, p. 43. "MPLS: more interesting than you think", Network World, May 2002, pp. 64. "Access Management: Novell Secure Access", Information Security , May 2002, pp. 74--81. "Wireless Lan Security", Network World , May 6, 2002, vol. 19, no. 18, pp. 61--68. "NetScreen-5200 and NetScreen-208 Product Review," Network World, May 6, 2002, vol. 19, no. 18, pp. 81. "Next terror target: The Internet?", Computer World, June 10, 2002. "Crying wolf: False alarms hide attacks", Network World, June 24, 2002, pp.57-64. "Securing the wireless LAN", Network World, August 12, 2002, pp.39. "Debug It Yourself ", Wired Magazine, August 2002. "ILabs team weighs wireless security options", Network World, September 9, 2002, pp. 51. "Strategy: Wireless security with 802.1X", Network World, September 9, 2002, pp. 51. "Browser-based wireless security", Network World, September 9, 2002, pp. 52. "Wireless IPSec", Network World, September 9, 2002, pp. 52. "WEP is bad, but better than nothing", Network World, September 9, 2002, pp. 52. "MPLS and IP storage testing update", Network World, September 9, 2002, pp. 52. "Why trade shows still matter", Network World, September 30, 2002, pp. 39. "Maturity brings a new face to IPSec VPN products", Network World, October 28, 2002, Vol. 19, Number. 43. "Rolling out remote access", Network World, October 28, 2002, Vol. 19, pp. 52-58. "IPSec VPN alternatives", Network World, October 28, 2002, Vol. 19, pp. 56. "IPS: A technology, not a product", Network World, November 25, 2002, pp. 41. "Down for the Count", Wired magazine, December 2002. "Make sure your PKI is up to the task", Network World, April 16, 2001, pp. 49. "Learning Lessons from Code Red", Network World, September 10, 2001, pp. 53. "Site-to-Site IPsec Technology," Network World, October 1, 2001, vol. 18, no. 40, pp. 47--52. "DISTRIBUTING ACCESS CONTROL", Information Security, October 2001, pp.80-84. "Lessons on Disaster Recovery," Network World , November 11, 2001, vol. 18, no. 45, p. 47. "MCIWorldCom should finish what's already on its plate", Network World , June 26, 2000, p. 59. 199919981997"What's in a good Domain Name Service," Back Office Magazine, January 1997, pp. 43--50."Traffic Sense," Internet World, January, 1997. "Keeping the Huns at bay," Network World, February 3, 1997, pp. 41--52 (A review of eight firewalls). "Snubbing Standards," Internet World, February, 1997. "Barbarians at the Gate,"" Back Office Magazine, March, 1997, pp. 71--82 (Firewall Performance Testing). "Staying Alive," Internet World, March, 1997. "Internet Web Servers Buyer's Guide," Network World, April 7, 1997, pp. 39--44. "Upside to IP Fees," Internet World, April, 1997. Also available translated into Spanish. "Buyer Beware," Internet World, May, 1997. Also available translated into Spanish. "Planning for Disaster," Internet World, June 1997. "Serving up Intranet Apps," Network World, June 23, 1997, pp. 22--25. "Dangerous Ideas," Internet World, August, 1997. Also available translated into Spanish. "Better Management Through Consolidation, Network World, August 18, 1997, pp. 59--60. "Travel Connections," Internet World, September, 1997. Also available translated into Spanish. "Protecting Your Name," Internet World, October, 1997. Also available translated into Spanish. "The Best Way to Build a VPN," Network World, November 10, 1997, pp. 55--60. "The Trouble with Java," Internet World, November, 1997. Also available translated into Spanish.
"Ethernet in the Fast Lane," MacWorld, March, 1996, pp. 128--133 (a discussion of 100 Mbps LANs) "A Flurry of Firewalls," Network World, January 29, 1996, pp. 59--68. "Get Real", Internet World, February, 1996, pp. 72-74. "Directory Sync Revisited," Network Computing, February 15, 1996, pp. 100--108. "E-mail Interoperability Software: A Backbone to the World," InfoWorld, March 4, 1996, pp. 68--80. "A Home on the Range," Internet World, March, 1996, pp. 74--76. "The Dating Game," Network World, March 11, 1996, pp. 21--23. (review of enterprise-wide scheduling systems). "Good, Bad, and Ugly Pages," Internet World, April, 1996, pp. 26--28. "Groupware: Colonizing New Ground," Network Computing, March 15, 1996, pp. 47--64. "LANsurveyor 3.0," MacWorld, April, 1996, pp. 70. "100 Mbps LAN Technologies Special Report," IT/IS Back Office, April, 1996, pp. 45--60. "Apple Bears Fruit in Unix Arena," Network Computing, April 15, 1996, pp. 23. "Too Little, Too Late," Internet World, May, 1996, pp. 58--59. "Put more ability into your E-mail RFP," Network World, June 3, 1996, p. 53. "Web Lessons Learned," Internet World, June, 1996, pp. 64--66. Also available translated into Spanish. "Frontier Justice," Internet World, July, 1996, pp. 72--73. "Travel Ware," Internet World, August, 1996, pp. 67--68. "Mail servers for Windows NT," IT/IS Back Office, September, 1996, pp. 93--100. "Stop, Thief!," Internet World, September, 1996, pp. 71--72. "The Switch for a Fast Generation," Network Computing, September 1, 1996, pp. 50. (review of 100 Mbps switch product) "Bits and Bucks," Internet World, October, 1996, pp. 51--52. Also available translated into Spanish. "DNS Servers for Windows NT," IT/IS Back Office, October, 1996, pp. 89--97. "EtherPeek 3.0: Worth More Than A Glance," Network Computing, October 15, 1996, pp. 54. "Big, Bad E-Mail," Network Computing, October 15, 1996, pp. 98--118. (review of email backbone products) "Uninvited Guests," Internet World, November, 1996, pp. 63--65. "E-Bomb Fallout," Internet World, December, 1996, pp. 68--69.
"Internet Insecurity," Internet World, February, 1995, pp. 94--95. "Sizing Up Electronic Meeting Systems," Network World, Winter, 1995, pp. 29--32. "Safeguard Your Network," MacWorld, February, 1995, pp. 123--127. "Branch Office Routers: Extending the Enterprise," Network Computing, January 15, 1995, pp. 62--77. "Meeting the E-Mail Challenge," MacWorld, April, 1995, pp. 110--114. "Utility Encrypts AppleTalk Data," MacWorld, April, 1995, pp. 153. "Branches directs CD-ROM Access," Digital News and Review, February 20, 1995, pp. 25--26. "A Hard Look at Multimedia," Internet World, March, 1995, pp. 88--89. "StarNine Fills the E-Mail Gap," MacWorld, May, 1995, pp. 139. "Choosing the right firewall to defend your network," Network World, March 6, 1995, pp. 1, 47--49. "Bringing up Baby," Internet World, April, 1995, pp. 103--104. "Fast LAN adapters Buyer's Guide," Network World, April 3, 1995, pp. 43--47. "Crime, Moderation, and Punishment," Internet World, May, 1995, pp. 91--93. "Directory Assistance," Network Computing, June 1, 1995, pp. 88--100 (review of 4 Email directory synchronization products). "Finding it on your own," Internet World, June, 1995, pp. 97--99. "Road Warriors on the Infobahn," DECUS'95, Spring/Summer, 1995, pp. 12--13. "Happy Trails," Internet World, July, 1995, pp. 82--84. "Making Macs into Internet Servers," MacWorld, July, 1995, pp. 138. "Email Options Add Up," MacWorld, August, 1995, pp. 151. "Torture Test," Internet World, August, 1995, pp. 96--97. "Putting your Web site into orbit: Five servers that help fire it up," Network World, July 31, 1995, pp. 1, 46--48. "Research on the Internet," Communications of the ACM, August, 1995, volume 38, number 8, pp. 130. "Pick the Best Browser," MacWorld, October, 1995, pp. 110--114. "Web Users Beware," Internet World, October, 1995, pp. 96--97. Also available translated into Spanish. "Roadblocks to E-mail Convergence," Network World, October 16, 1995, pp. 23--24. "Do Web Servers Mean Business?" IT/IS Back Office, November, 1995, pp. 53--58. "The Name Game," Internet World, November, 1995, pp. 122--124. "Too Big for your Own Good," Internet World, December, 1995, pp. 86--88. "PDAs for the Real World," LAN Magazine, December, 1995, pp. 71--76.
"The SCSI-to-Ethernet Connection," MacWorld Magazine, January, 1994, pp. 169--171. "How to get Unix and Mac working together over NFS," MacWeek Magazine, January 3, 1994, pp. 32--34. "Wire Happy," Macworld UK, January, 1994, pp. 75--76. "SNMP and the Macintosh," MacWorld Magazine, February, 1994. "Linking Appletalk Workgroups over TCP/IP," MacWorld Magazine, April, 1994, pp. 165--168. "Innosoft PMDF Carries E-Mail On Its Back," Network Computing, February 14, 1994, pp. 99--103. "Learning about TCP/IP," Network Computing, February 14, 1994, pp. 111-113. "How Remote Access Brings the Office to the Outlands," Digital News and Review, February 21, 1994, pp. 25--26. "Mac Groupware: A Collaborative Effort," LAN Magazine, March, 1994, pp. 130--144. "The Trouble with Gopher," Internet World, March/April, 1994, pp. 30--34. "TCP/IP Illustrated," Internet World, March/April, 1994, pp. 84. "Online While Outta' Town," Internet World, May, 1994, pp. 62--64. "Turning A Fresh Page on TCP/IP and OSI," Network Computing, April 1, 1994, pp. 106. "Keeping an eye on the network," Digital News and Review, April 4, 1994, pp. 1, 23--25. (comparison of SunNet Manager, OpenView Network Node Manager, NetView/6000) "Linking Macintosh Workgroups Worldwide," MacWorld Australia, April, 1994, pp. 44--46. "Internet Integration," Interoperability, May, 1994, pp. 45--59. "Network Management Shoot-Out," Advanced Systems, May, 1994, pp. 56--64. "Solving Network Mysteries," MacWorld Magazine, July, 1994, pp. 160--162. "Interligando Groupos de Trabalho AppleTalk via TCP/IP," MacWorld Brazil, April, 1994, pp. 40--43. "Fast Packets, Easy Routers," LAN Magazine, July, 1994, pp. 42--56. "Going Mobile," LAN Magazine, August, 1994, pp. 122--132. (Special report on LAN remote access technologies) "A Mac view of X Window," Digital News and Review, June 6, 1994, pp. 17--27. (Comparison of White Pine and Apple X Servers) "Cross Examination: Solving Network Mysteries," MacWorld UK, July, 1994, pp. 93--99. (Macintosh protocol analyzers compared and reviewed) "Making sense of TCP/IP in DOS, Windows," Network World, September, 12, 1994, p. L2. "Apple Pickings, Suites for the Mac," Internet World, October, 1994, pp. 66--68. "Blackbirds Make Analyzers Sing," MacWorld, November, 1994, pp. 145. "Internet: Going South," Internet World, November/December, 1994, pp. 94--95. "Resolving the problems of micro-based E-mail systems," Network World, November 14, 1994, pp. L4-L5. "Taming the Internet," MacWorld, December, 1994, pp. 114--117.
"TGV puts XView on VAX/VMS," SunWorld, February, 1993, pp. 63--65; "Network notes from DECUS," Digital News and Review, February 1, 1993, p. 7; "Network of Networks," LAN Magazine, February, 1993, pp. 137--146; "Stretch your Horizons in Building a Network," Digital News and Review, March 1, 1993, pp. 13--14; "Planet X and XGator," SunWorld, April, 1993, pp. 60--63; "Sonet: It's so fast, you can't even buy it yet," Digital News and Review, April 5, 1993, p. 9; "Avoiding the Apples to Oranges Comparison: Macintosh File Server Connectivity," Network World, April 5, 1993, pp. 31--36; "Compatible's RISC*Router Aims Low, Hits Mark," LAN Times, April 5, 1993, pp. 31--35; "ISDN in the US? Don't hold your breath," Digital News and Review, May 3, 1993, p. 9; "Making the TCP/IP--to--OpenVMS Link," LAN Times, May 24, 1993, pp. 91--98; "The basics of ISDN," Digital News and Review, June 7, 1993, pp. 13--14; "A TCP/IP Green Thumb," LAN Magazine, June, 1993, pp. 139--150; "A/UX and MachTEN: Serious Unix for Macs," SunWorld, July, 1993, pp. 53--58. "A broad look at ISDN," Digital News and Review, July 12, 1993, p. 9; "Jack Kerouac never had to worry about E-mail," Internet World, Summer, 1993, Vol. 4, Nos. 5--6, pp. 2--4; "Getting Macs in tune with the enterprise network," MacWorld Australia, August, 1993, pp. 6--14; "Relief for Multivendor-Network Woes," LAN Times, August 23, 1993, pp. 27--28, 32; "Global Connectivity: Link users down the hall and across the sea with TCP/IP," MacWorld Magazine, October, 1993, pp. 168--173; "NetMetrix Turns Sun Workstations Into Full-Fledged Network Analyzers," LAN Times, September 20, 1993, pp. 83--84; "There's No Tech Like Low Tech," Digital News and Review, September 13, 1993, p. 9; "Wollongong's SNMP Management Station," Network Computing, September, 1993, pp. 46--54; "Digging through all the AppleTalk tunneling options," Network World, October 4, 1993, pp. L2--L4; "Linking AppleTalk," Digital News and Review, October 11, 1993, p. 11; "Lotus Notes Explored, Examined, and Explained," LAN Times, November 15, 1993, pp. 109--118; "Network, P.I.," LAN Magazine, November, 1993, pp. 93--102. (review of Macintosh Network Protocol Analyzers);
"Managing DECnet Phase V," Digital News, March 16, 1992, pp. 9--15. "Macintosh and VAX/VMS Application Programming Interfaces," Digital News, April 27, 1992, pp. 27--30. "Two books on DECnet Phase V: Review," Digital News, April 27, 1992, pp. 55, 67. "X.500 Will Gain Wide Acceptance," Digital News, June 8, 1992, pp. 13--15. "NFS clients on the Macintosh mean compromise," Digital News, June 22, 1992, pp. 33--34. "Planet X: Review," Digital News, July 20, 1992, pp. 25, 30--31. "Lessons from the Trenches," Digital News, July 20, 1992, pp. 1,15,33. "The Gestalt of Ethernet," Digital News and Review, October 12, 1992, pp. 9--10. "Network Connectivity," (review of EtherPrint, EtherPrint Plus, and Ether Write) MacWorld, December, 1992, p. 264 (a version of this article was translated and published in Macin, April, 1993, pg. 37). "Twiddling with DECnet," Digital News and Review, November 12, 1992, pp. 15--16. "Painting Apples Blue," LAN Magazine, December, 1992, pp. 38--46. "Harmony, Melody, and DECnet," Digital News and Review, December 7, 1992, pp. 17--18.
"Improving the security of Ethernet," Digital News, March 18, 1991, pp. 10--16. "Pathworks for Macintosh Product Profile," Digital News, April 1, 1991, p. 37 (with F Janton). "Standards: the key to a network," Digital News, April 29, 1991, pp. 11--14 . "Too much news is good news," Digital News, June 10, 1991, pp. 17--48. "The Great Network War," Digital News, July 22, 1991, pp. 15--19. "Networks: In need of answers," Digital News, September 2, 1991, pp. 15--18. "TGV Multinet 3.0 Product Profile," Digital News, September 2, 1991, pp. 37--54. (with A Leonard) "Clearing up Ethernet confusion," Digital News, October 14, 1991, pp. 29--39. "DECUS: A worthwhile investment," Digital News, November 25, 1991, pp. 39--65.
"Network Trends to the Year 2000," presented at International Conference on Social Informatics, April 25--May 3, 1990, Gurzuf, USSR (Invited participant). "An Exercise in DECnet Networks," Digital News, December 10, 1990, pp. 27--34; "Analysis of Recent Developments: Telecommunications in the Soviet Union," Mosaic Group Technical Report, January, 1990, 72 pp. (with W K McHenry). "USSR Status Report: Spring, 1990," Mosaic Group Technical Report MOS-1990-018-I, July, 1990, 45 pp. (with S E Goodman and E Millan)
"High Speed Dial-up Modems: Start of the Art, Evaluation, and Recommendations," Views on VAX, Volume 2, Number 3, October, 1989, pp. 1--4. "Elektronmash Organization---Analysis and Status Report," Mosaic Group Technical Report, July, 1989, 48 pp.
"Eastern European Attempts to Clone the VAX," University of Arizona MIS Department Working Paper CMI-WPS-88-10, Tucson, Arizona, September, 1988, 11 pp. "Pact Countries Clone U.S. Computers," Signal, Volume 43, No. 4, December, 1988, pp. 55--62.
"A Look at Cuban Networks," Matrix News, 2(6), Matrix Information and Directory Services, Austin, June, 1992. "International Electronic Mail in the Soviet Union and Eastern Europe," IEEE Computer, March, 1991, pp. 81--84. (with A T Jarmoszko and S E Goodman)
"Technology to Support Groupware: The "Overview of CARAT: A Computer Assisted Research and Analysis Tool," in Jay F. Nunamaker, Jr, ed., Proceedings of the Twenty-Fourth Annual Hawaii International Converence on System Sciences: Volume IV: Organizational Systems and Technology, 343--353, January, 1991. Los Alamitos, CA: IEEE Computer Society Press. (with K Lynch) "Cross-Cultural Information Technology Research: The Case of Eastern Europe and the USSR," in DeGross, Janice, et. al., eds., Proceedings of the Eleventh International Conference on Information Systems, Copenhagen, Denmark, 73--86, December 16--19, 1990. Baltimore, Maryland: ACM Press. (with W K McHenry and K J Lynch). A revised version of this paper was also published in Computer Engineering and Applications, Volume 5--6, 1991, pp. 65--77 (translated by Kong Xioyang). "The Arizona Analyst Information System: Supporting Collaborative Research on International Technological Trends," Proceedings of the IFIP WG 8.4 Conference on Multi-User Interfaces and Applications, Heraklion, Greece, 159--174, September, 1990. (with K Lynch, D Vogel, and W McHenry) "Requirements for Integrated Collaborative Research Systems," in Ralph Sprague, Jr, ed., Proceedings of the Twenty-Third Annual Hawaii International Conference on System Sciences: Volume IV: Emerging Technologies, 72--81, January, 1990. Los Alamitos, CA: ACM Press. (with K Lynch, L Hoopes, S Goodman, and W McHenry) "A Routing Architecture for Very Large Networks Undergoing Rapid Reconfigurations," SIGCOMM '89, Austin, Texas, September, 1989. Also published in: Computer Communications Review, Volume 19, Number 4, pp. 57--63. "Multiple Indices and Index Hierarchies as an Aid to Information Retrieval from Large Databases," Third Pan Pacific Computer Conference, Beijing, China, August, 1989, pp. 490--497. (with E Masland) Editor of Proceedings of the Digital Equipment Computer Users Society, Fall, 1983. Also, Spring, 1984; Fall, 1984; Spring, 1985; Fall, 1985; Spring, 1986; Fall, 1986; Spring, 1987; Fall, 1987; Spring, 1988; Fall, 1988; Spring, 1989; Fall, 1989; Spring, 1990; Fall, 1990; Spring, 1991. Managing Editor of DECUS Journal, December 1991--September 1992.
Opus One White PapersThe papers below were written by Opus One staff.VPN Authentication Methods (XAUTH, Hybrid, and Crack) High Availability and Security for Cisco Catalyst 4500 Series Switches High Availability Features for Cisco Catalyst 6500/7600 Switches and Routers Scaling up for MPLS VPN Service with 10 Gigabit Ethernet High Availability Integrated Services Modules for the Catalyst 6500/Cisco 7600 Six Strategies for Defense in Depth in Enterprise Networks Steps to picking the right Intrusion Prevention System (IPS) for your company Seven Requirements for Enterprise IPS Products Unified Thread Management (UTM) Firewall Requirements for Enterprises Virtual Machines, Networking Security and the Data Center: Six Key Issues and Remediation Strategies(funded by Juniper Networks) Knowledge is Power: Tactical Approaches to Using Network Security Technologies for Deeper Insights Firewalls in the Data Center: Main Strategies and Performance Metrics Results of Testing Juniper Branch SRX Firewalls (Full Results, 23 pages; an 8-page Executive Summary is also available.) Network Access Control (NAC) White PapersNetwork Access Control (NAC) Deployment MethodologiesNetwork Access Control (NAC) Enforcement Options Discussion
Anti-Spam White PapersAnti-spam Testing MethodologyFeb, 2007 Anti-Spam Testing Results (funded by Trend Micro) May, 2008 Performance Testing of Crossbeam X80 with anti-spam and anti-malware (funded by Crossbeam) 2009 Best Practices in Using Reputation Services White Paper (funded by Ironport) Summary of Results of Efficacy Testing of Anti-Spam Solutions for the 2010 Calendar Year Dec, 2011 Anti-Spam Testing Results (funded by Trend Micro) Aug, 2012 Anti-Spam Testing Results (funded by Trend Micro) March, 2013 Anti-Spam Testing Results (funded by Trend Micro) October, 2013 Anti-Spam Testing Results (funded by Trend Micro) Summary of Results of Efficacy Testing of Anti-Spam Solutions for the 2013 Calendar Year July, 2014 Anti-Spam Testing Results (funded by Trend Micro) December, 2015 Anti-Spam Testing Results (funded by Trend Micro) Summary of Results of Efficacy Testing of Anti-Spam Solutions for 2015 (funded by Cisco Systems) Best Practices in Securing Office 365 Email
ISOC White PapersOpus One wrote some "quick release" white papers for ISOC in 2011. These are included here for completeness sake.Understanding your online identity: An Overview of Identity Understanding your online identity: Learning to Protect your Online Identity Understanding your online identity: Protecting your Privacy
CDW Reference GuidesOpus One also provides ghost writing services. You can take advantage of our decades of experience in networking, messaging, and security--and in communicating that knowled effectively--to get your message across authoritatively. CDW's Network and Security Reference Guides were written by Opus One and are good examples of the type of vendor-neutral writing we are proud to produce.The High-Performance WAN: Tools for Optimizing Networks (2013 edition) Network Infrastructure Reference Guide (2013 edition) Enterprise Wireless Infrastructure (2012 edition) Continuous Monitoring of Information Security (2012 edition) Mobility Security for Enterprises (2012 edition) Security Reference Guide (2011 edition) Security Reference Guide (2010 edition) Network Reference Guide (2011 edition)
Interop White PapersThe papers which appear below from the Networld+Interop iLabs are ones that Opus One contributed to, but does not claim sole ownership of. They are reproduced here so that they have a permanent "home" and don't get lost.PKI White PapersWhat is a Certificate?AAA (Authentication, Authorization, and Accounting) and PKI How do I get a Certificate stored on my hardware token? How do I use Certificates on the WWW? References and Resources on Public Key Infrastructure How do I use Certificates with Email? What is a CRL (and how do I use one)?
802.1X White PapersWhat is 802.1X?What are your EAP Authentication Options? Security: What Layer is Appropriate? 802.1X Inner Authentication Methods Cooking up 802.1X Successfully
What's Wrong with WEP?
© 2011, 1997 Opus One . Site by DesertNet Designs |
||
|