Wednesday, September 02, 2009

Open-source BI vendor Pentaho pushes migration deal

Best of Open Source Software Awards 2009; Red Hat open sources Windows virtualisation drivers
Network World logo Linux and Open Source Alert
Linuxworld.com | Update Your Profile


Sponsored by Vyatta
rule

Vyatta - Open Source Router & Security
Vyatta incorporates IPtables, Quagga, OpenVPN, Squid and more into a complete network operating system with a familiar CLI and web GUI. Vyatta software delivers higher performance than Cisco ISR/ASA using standard x86 hardware and can be easily added to Xen & VMware environments.

Click here.

rule

Spotlight Story
Open-source BI vendor Pentaho pushes migration deal

Add open-source BI (business intelligence) vendor Pentaho to the list of vendors rolling out financial incentives to lure customers during the global recession. Read full story

Related News:

Best of Open Source Software Awards 2009
If you think you can easily whittle down the best open source software to a manageable number, you'll soon discover that you can't do it without a great deal of hair pulling, nail biting, and gnashing of teeth. There are just too many excellent tools. Even if you give up on a "manageable" number and go whole hog -- say, a top 100, which is certainly doable -- you'll still face too many hard decisions and too many arguments. You'll be looking for a way out.

Red Hat open sources Windows virtualisation drivers
In another sign interoperability between virtual Linux and Windows operating systems is gathering pace, Red Hat has quietly released a set of drivers to improve the performance of Windows guests hosted on Linux's Kernel-based Virtual Machine (KVM) hypervisor.

Goldman Sachs case; can open-source software be stolen?
Arrested last month for stealing cutting-edge trading software from his former employer, Goldman Sachs Group Inc., programmer Sergey Aleynikov offered up an interesting defense: he was only trying to download open-source software. According to a report published Sunday in the New York Times , Aleynikov told FBI investigators that he had inadvertently taken about 32 MB of proprietary Goldman Sachs while taking open source code that can be used freely by anyone.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more


Optimizing IT Budgets In tight Economic Times
Download this whitepaper and learn how one $5,000-10,000 server can manage 250,000 endpoints reducing the number of consoles and Full-Time Employees (FTEs) to manage them.
Learn More

 

September 02, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 cool ways to donate your PC's spare processing power
  3. Developer denies software to beat Chinese censors is malicious
  4. 15 smartphone apps you shouldn't live without
  5. Only 13% of Wikipedia contributors are women
  6. The ABCs of WAN optimization savings
  7. 12 words you can never say in the office
  8. Apple: 'Exploding' iPhones 'not our fault'
  9. Slideshow: VMworld product blitz
  10. Group offers tools to evade China's Web censorship

Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment