Search This Blog

Wednesday, June 06, 2007

10 low-cost virtualization tools; The Avaya sale: Risks for customers

Network World

Daily News: AM




Network World Daily News: AM, 06/06/07

10 low-cost virtualization tools worth noting
More and more IT shops are validating the benefits of desktop and server virtualization, from energy efficiency to better resource utilization. But if you’re still leery of forking over big dollars for the technology, there are some low-cost and no-cost ways to give virtualization a try.

The Avaya sale: Risks for customers
The sale of Avaya is just the latest in an increasing number of private-equity buyouts of technology companies that might not be good things for customers. Plus: Q&A: Avaya's COO on what's next

Vendors seek unity on identity protocols
Microsoft will participate in a meeting later this month with vendors and organizations that are backing several different identity management systems, an indication that cooperation between the software giant and its peers is improving.

Manage Skyrocketing Storage

The data on your network is growing at a rapid pace that's only going to increase. Download Network World's latest Executive Guide and get the practical, real-world advice and insider information you need to best manage and meet your storage demands and industry regulations.

Click here to download.

How secure is your security software?
Think that commercial software you just bought has been adequately tested and is ready for deployment? Think again. Plus: The importance of vulnerability research

Microsoft: No Software Assurance, no apps virtualization
Microsoft on Tuesday reaffirmed that its applications virtualization technology will be available only as part of a bundle of desktop-management tools and only to users with Software Assurance contracts.

Tools aim to ease Vista deployment pains
Microsoft released tools to help companies deploy Windows Vista, acknowledging that there are deployment and application-compatibility pains enterprise IT managers face when updating business desktops to the new OS.

Do-it-yourself wireless backbone takes shape on Cape Cod
A nonprofit group of wireless pilgrims is venturing into virgin territory to create a regional wireless backhaul net to bring broadband capacity to Cape Cod, Mass., where the original Pilgrims first set foot nearly 400 years earlier.

Cities trade secrets for launching public Wi-Fi
Despite the tribulations of launching a regional wireless Internet network, some cities are making progress by sharing their hard-won lessons.

Google at odds with the locked-down enterprise
Security has been a bit of a black art at Google Inc. Unlike rival Microsoft Corp., which publishes detailed information on its monthly patches and has openly evangelized the steps it takes to secure software, Google has generally been quiet when it ...

Google: Attack code more likely on Microsoft IIS
Web sites running Microsoft's Web server software are twice as likely to be hosting malicious code as other Web sites, according to research from Google.

Blogs

Buzzblog: Touch the paper, hear a voice
In other words, what if "money talks" wasn't just an expression? Researchers at Mid Sweden University may have opened the door to such wild scenarios with their introduction of interactive paper that makes sounds when touched. Imagine the possibilities.

Today on Layer 8, we go geek with a look at some great USB devices:
From speedy mice to running hamsters and gyrating Elvises and desktop missile launchers, is there anything more fun that a truly geeky gadget? Well, of course there is. But after having witnessed the Dancing Elvis Phone at a recent trade show, we wanted to see how geeky we could get. That naturally lead to the USB world, where there’s no end to the geeky things you can link to your PC. Here are the top 15 I thought were the most amusing.

TODAY'S MOST-READ STORIES:

1. 5 new ways to authenticate users
2. FAQ: What Avaya going private is all about
3. What Google bought in the past 12 months
4. Churn in the VoIP market?
5. Will Cisco suffer IBM's fate?
6. Firefox flaws raise Mozilla security doubts
7. Adult filmmakers taking their lumps on ‘Net?
8. Avaya goes private in $8.2B deal
9. Slideshow: 5 new ways to authenticate users
10. Stealthy attack serves malicious code only once

MOST-READ REVIEW:
How low can your data go with virtual tape libraries?


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: