Close this Advertisement
Login | Register
What is your e-mail address?
My e-mail address is:
Do you have a password?
I don't have a password. (Sign up now!)
I have a password
Forgot your password? Click here
close
GCN
Advanced Search
Magazine
Current Issue
Archives
Free Subscription
Subscription Services
Subscribe
Magazine
Newsletters
RSS Feeds
Lab Reviews
GCN Awards
GCN Awards Gala
2012 GCN Award Winners
Blogs
CyberEye
GCN Lab Impressions
Tech Blog
Events
1105 Government Information Group Events
GCN Gala
FOSE
GOVSEC
Industry Events
Webcasts
Content Libraries
Digital Libraries
Whitepaper Library
Resource Center
New! Research Report: Mobile and Wireless
New! Special Report: Cloud Services
New! Special Report: Converging Communications
New! Expert Q&A: Cloud Computing
New! Expert Q&A: Health IT
Contract Guide: NITAAC
Special Report: Modernizing the Network
Special Report: Cybersecurity
Expert Q&A: Big Data
Special Report: Client Computing
Special Report: Advancing Agency Infrastructure
Expert Q&A: Continuous Monitoring
Contract Guide: SEWP 2012
Special Report: Defense IT
2012 Library
HOT TOPICS
Joint Special Report: Cybersecurity
GCN Lab Reviews
Big Data
Cloud/Virtualization
Collaboration Tools
Data Center Consolidation
Data Record Management
Defense IT
Enterprise Architecture
Geospatial
Hardware/Peripherals
Homeland Security/COOP
IT Systems Management
Mobile and Wireless
Networks Communications Systems
Security / Cybersecurity
Software
State and Local
Resource Center
New! Research Report: Mobile and Wireless
New! Special Report: Cloud Services
New! Special Report: Converging Communications
New! Expert Q&A: Cloud Computing
New! Expert Q&A: Health IT
Contract Guide: NITAAC
Special Report: Modernizing the Network
Special Report: Cybersecurity
Expert Q&A: Big Data
Special Report: Client Computing
Special Report: Advancing Agency Infrastructure
New! Expert Q&A: Continuous Monitoring
Contract Guide: SEWP 2012
New! Special Report: Defense IT
2012 Special Reports Library
08/14/2000
Volume 19 Issue 23 August 14 2000
GCN_Lab_Review
Xiotech Corp.'s Magnitude is the first true SAN-in-a-box
Network storage & SANs
Spectrum 9Glrs shows crisp images at a good price
Adaptable Mimio maxes out presentation value
Handy 2G Jaz is realistic size for today's PC storage tasks
LAB NOTES
The BeOS office suite lacks maturity and sophistication
OS alternative is causing all the buzz
GCN_News
Microsoft tucks some nice extras into Windows Me
Gore's VP choice is big on federal systems issues
Defense college's CIO course draws feds governmentwide
Uncle Sam seeks cybercrime aid
Civilian lab researchers gain computing edge
Army online training portal takes shape
ITAA chief calls for cybersecurity facility modeled on Y2K center
Computer security data has nine lives in ICAT metabase
Agriculture tags SAIC for risk management IT support
USDA honors 15 employees for exemplary systems work
CIO Council working group will develop a federal XML guide
Defense supercomputer models all oceans at once
Latest Palm handheld sells for less than $150
New Linux PDA and apps make their debut
Clinton clears Katzen for OMB No. 2 post
DOD saves on reverse auctions, plans more
GCN_Commentary
THE BELTWAY AND BEYOND
THE VIEW FROM INSIDE
EDITORIAL
GCN_TechBriefs
Novell updates Web products
USPS upgrades sorting systems
Find that data in Haystack
NOAA sets up underwater net
RCAS program gets new boss
IRS begins e-filing survey
Nuclear teams get viz package
Navy to open e-business office
GCN_Tech Trends
GTSI launches federal customer subsites that it says improves searches
VIEW FROM THE FRONT
In a test of online sites aimed at government buyers, a team of reviewers finds more to dislike than to like
Online buying
Security device reconstructs network traffic
Industry initiates Web site privacy policy adoption
Navy calls on voice over IP
INTERNAUT
Most Popular Articles
Most Emailed Articles
A call for global action on cyberattacks
NIST lays groundwork for encrypting IoT devices
Elections officials explore security options
TSA plans to add machine learning to carry-on baggage scans
Are you sure that application belongs in the cloud?
West Virginia tries blockchain-based mobile voting
Elections officials explore security options
How artificial intelligence is transforming GEOINT