Linda Musthaler

Linda Musthaler is a Principal Analyst with Essential Solutions Corp. which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.


Mobility is on the precipice of radically changing enterprise IT as we know it

Mobility is up-ending everything we know about enterprise IT. If your organization isn't already on this bandwagon, you are falling behind the curve of increased productivity and innovation.

Vectra Networks correlates odd bits of user behavior that signal an attack in progress

Perimeter security is insufficient, especially against insider attacks. Companies need additional capabilities that can identify attacks in progress. Vectra Networks utilizes user behavioral analysis to identify and correlate...

Get ready to replace datacenter appliances with telco services

New platforms are enabling telcos to offer IT-aware services for security, performance and optimization, private cloud, and other functions. Soon enterprises and SMBs can simply use a portal to order a function as a service instead of...

Energy-aware software design can reduce energy consumption by 30% to 90%

Green IT has traditionally defined hardware designed with power-saving features. That's all well and good, but the real savings are in software that tells hardware what to do. Case studies of energy-aware software have shown the...

More than just windmills and tulips, The Netherlands is the Digital Gateway to Europe

The Netherlands has fewer than 17 million people, but it is a digital powerhouse on the western edge of Europe. Many of the world's leading information and communication technology companies are setting up shop in Holland because of...

Incapsula estimates DDoS attacks cost $40,000 per hour

Incapsula just published its 2014 DDoS Impact Report, and the vendor estimates the average DDoS attack costs the victim company $40,000 for every hour of outage, and most attacks last between 6 and 24 hours.

ScaleBase takes relational databases to web scale in an instant

The relational database was purpose-built for the cloud and is said to be able to scale out easily and cost effectively.

Next generation Geo-IP filtering can be fine tuned to vastly reduce unwanted and malicious traffic

Next generation Geo-IP filtering can be fine tuned to vastly reduce unwanted and malicious traffic

The majority of the malicious attack traffic originates from just a handful of countries, and next generation Geo-IP filtering tools offer more granular filters that can cut some of the bad stuff off at the pass.

DNS is ubiquitous and it's easily abused to halt service or steal data

DNS may be absolutely fundamental to the way the Internet works, but it was never designed with security in mind. Here are four ways that attackers and cyber thieves are exploiting the Internet's plumbing to deny service and steal...

Indeni utilizes expert knowledge to preempt network problems before they occur

Imagine if you had a solution that could tell you if your network was misconfigured or a problem was about to happen. What if it could pinpoint what is causing that flakey issue that comes and goes? Indeni is delivering a network...

NetBeez is busy as a bee monitoring networks from an end user perspective

Traditional network monitoring primarily looks at the health and status of major net components. That's not enough to tell a story when an end user in a remote location contacts the help desk with a connectivity or application...

Load More