Search This Blog

Monday, June 18, 2007

Review of open-source management tools; NXTcomm to show raft of next-gen service gear

Network World

Daily News: PM




Network World Daily News: PM, 06/18/07

Breaking news

NXTcomm to show raft of next-gen service gear
IMS, IPTV and Carrier Ethernet to highlight NXTcomm conference in Chicago.

The do’s and don’ts of data breaches
Security consultants and professionals advise on how to react to a data breach.

Network World Storage Buyer's Guide

If you're in the market for anything from a tape library to an on-line backup service to a complete, drop-it-in-place SAN Solution, check out this Buyer's Guide with close to 200 products divided among specific, storage market segments.

Click Here

HP acquisitions bring new, updated service management software
HP releases updated change control and configuration management software, as well as services designed to help customer roll out ITIL best practices.

Test

Open source management-tool alternatives hit the mark
Several open source networking vendors offer free tools that conform to the GNU licensing strategy and whose source code is readily downloadable on the Internet. If you hate to spend money, if you embrace the tenets of the Free Software Foundation or if you have programming skills you can devote to customizing and maintaining your own networking tools, then one of the three open source network management tools we tested might be right for you.

From the blogs and forums

Jeff Doyle, author of Routing TCP/IP, is back. We originally signed him on to do a guest Cisco blog for a month, but so many people liked his blog that he's now back for good. Check out the discussion sparked by his post, EIGRP vs OSPF.

Brad Reese wonders if Cisco certification candidates are forced to cheat. Denise Donohue looks at bringing VoIP home. Greg Royal is loving the idea of a Network General VoIP visualization tool.

Green Your Network says Texans are setting an example for the rest of us through a bill to require recycling of computer parts. Layer 8 asks if you think IBM should forgive a debt owed by a California school system that managed to lose all its computers - and paperwork related to the purchase. Keith Shaw wonders: Could the Sprint Mogul be the enterprise iPhone? Tyson Kopczynski shows how he solved the case of the XP box on which Kerberos stopped working. John Obeto writes ODF is losing traction.

Users debate whether network security can cut it anymore. One user thinks many data breaches are really the fault of CSOs and their ilk who ignore problems discovered by network engineers. Another thinks talk of network security not cutting it anymore is ridiculous, because the alternative is to rely on clients and end users. A user discusses heavy fragmentation and storage optimization.

In depth

Converged security pays dividends
Security convergence - integrating building- and IT-access systems - is supposed to make life easier for everyone: IT, building security staff and employees coming into the office each day.

How to

Ron Nutter helps a user figure out the best way to study on his own for the CCNA exam. Devin Akin discusses how to limit wireless clients to secured access points.

More news

How to create a computer-emergency response team
The basics of pulling together an incident-response team to react to data security breaches.

Linux community getting its second wind
Linux is entering its second phase of growth, which will be defined by better cooperation among developers, new licensing options, and a stronger operating system, according the leaders of the nonprofit Linux Foundation.

TODAY'S MOST-READ STORIES:

1. Microsoft: Mystery trio thwarts disk pirates
2. FBI finds over 1M botnet victims
3. The case of the 500-mile Email
4. Why network-based security doesn’t cut it anymore
5. New image spam hides in e-mail wallpaper
6. Wireless networks: The burning questions
7. Controversy threatens 100G standards work
8. Top 15 USB geek gadgets
9. SC courts run on Juniper enterprise gear
10. Bill Gates' Harvard commencement speech

MOST-DOWNLOADED PODCAST:
Twisted Pair: Spam spikes, Mac hacks and stealth attacks


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: