Search This Blog

Wednesday, June 06, 2007

Windows Server 2008 includes a little something for nearly everyone

Network World

Networking Technology Update




Networking Technology Update, 06/06/07

Windows Server 2008 includes a little something for nearly everyone

By John Fontana

It’s been years in the making, but Microsoft’s next server platform is finally in the stretch run and while it doesn’t appear revolutionary, it’s looking like the final release will deliver a grab bag of goodies to users looking to ease management, network and security issues.

How to Build a Next-Gen Infrastructure

Get expert advice, and real-world tips and tricks from network IT professionals on how to build the next-generation application, storage and management infrastructures that will take your organization to new levels of productivity and efficiency.

Click here to download this Executive Guide

But it isn’t all good news since Microsoft released in April the Beta 3 of Longhorn, now officially known as Windows Server 2008.

Gone from the planned final release by the end of 2007 are highly touted virtualization capabilities, designed to move users onto the next level with the white-hot technology. Virtualization was originally suppose to be baked into the server but will ship separately within 180 days of the server’s final release. On top of that, in May Microsoft cut three features from what is now called Windows Server Virtualization, including a highly anticipated live migration option.

Even though users will have to wait for those capabilities, the Longhorn Beta 3 is feature complete, according to Microsoft, and comes with enough new features that IT executives will be forced to make a list of must-haves before they begin rollouts.

Windows Server 2008 is focused on three primary areas: management, including Server Core technology; security, such as BitLocker drive encryption and Read-only Domain Controllers; and performance, including a redesigned TCP/IP stack.

For more on this story, please click here.

TODAY'S MOST-READ STORIES:

1. 5 new ways to authenticate users
2. FAQ: What Avaya going private is all about
3. What Google bought in the past 12 months
4. Churn in the VoIP market?
5. Will Cisco suffer IBM's fate?
6. Firefox flaws raise Mozilla security doubts
7. Adult filmmakers taking their lumps on ‘Net?
8. Avaya goes private in $8.2B deal
9. Slideshow: 5 new ways to authenticate users
10. Stealthy attack serves malicious code only once

MOST-READ REVIEW:
How low can your data go with virtual tape libraries?


Contact the author:
Network World Senior Editor John Fontana can be reached at jfontana@nww.com

BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: