by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : May 2013
10 GCN MAY 2013 • GCN.COM [BrieFing] Special Report THE EFFICIENT DATA CENTER: OPTIMIZATION TOPICS INCLUDE: RETHINKING DATA CENTER EFFICIENCY VIRTUALIZATION: THE KEY TO DRIVING EFFICIENCY STORAGE PLAYS STARRING ROLE IN EFFICIENCY EFFORTS IMPROVING EFFICIENCY: IT'S ALL ABOUT METRICS IS THE CONTAINERIZED DATA CENTER AN ANSWER? SPONSORED BY CDW-G AND HP TO LEARN MORE, VISIT: WWW.GCN.COM/2013EFFICIENTDATA Military members in remote areas rely on wireless devices not only to access the network, but often as a relay point for other devices. For this to work properly, the nodes in question have to accurately and securely share information about themselves. To help work on this problem, the Defense Advanced Research Projects Agency has started the Wireless Network Defense program to develop technology to improve the robustness of wireless networks without having to go back and develop entirely new radios devices. "Current security efforts focus on individual radios or nodes, rather than the network, so a single miscon gured or compromised radio could debilitate an entire network," Wayne Phoel, DARPA program manager, said in a statement. "We need to change how we control wireless networks by developing a network-based solution for current and future systems that acknowledges there will be bad nodes and enables the network to operate around them." A key objective of the program is to develop protocols that determine trustworthiness of neighboring wireless nodes and allow the network to auto- matically adapt to problems. So if an un- secured, faulty or otherwise suspicious node shows up (or one of the existing nodes becomes unsecure), the rest of the neighborhood will all know about it and be able to take appropriate action. Part of the inspiration for the program comes from the indicators that credit card companies use to ag potential misuse of someone's card. "Estimation and control methods could be applied to wireless military networks by calling out speci c areas of the network that may have untrustworthy nodes, he said. • DARPA puts out call to boost wireless network security BY GREG CROWE