Friday, September 30, 2005

Abandoned PC Risk / Gadget Friday

TECHWEB TODAY: NETWORKING
Friday, September 30, 2005

IN THIS ISSUE
1. Today's Top Story: Gadget Friday: App-Hosting USB Drives, And More
2. Networking News Of The Week

Breaking News
3. Unattended PCs Security Risk Underestimated
4. Some Voluntary Collection Of Internet Sales Taxes Begins
5. BlackBerry Maker Wins Round In Ongoing NTP Battle
6. RIAA Sues Another 750 For File Sharing

Today's Most Popular Stories
7. Second P2P Tosses In File-Sharing Towel
8. Microsoft Pushes Kid's Programming Language
9. Skype Updates Windows VoIP Offering
10. Big Blue Offers Solutions for Graying Workforce
11. IBM Offers 4-Gig SAN Solution

------- Advertisement -------------------
Attend a FREE, live CSI/FBI Roadshow TechWebCast on Computer Crime
and Security. The CSI/FBI Computer Crime and Security Survey is
the world's most widely quoted research on computer crime. Come hear
CSI Editorial Director Robert Richardson, author of the survey, discuss
the findings of the 2005 Survey and what they mean. Robert will be
joined by the FBI, who will discuss how and why to report crime,
and what happens when you do.
Wednesday, October 12, 2005 � 9:00-10:00 AM PT / 12:00-1:00 PM ET
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DdxE0EI

-----------------------------------------

-- Keep Getting This Newsletter --
Don't let future editions of TechWeb Today Networking go missing.
Take a moment to add the newsletter's address to your anti-spam
whitelist:

tw@update.techweb.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation. Thanks.

1. TODAY'S TOP STORY: Gadget Friday: App-Hosting USB Drives, And More
Memorex's TravelDrive and Iomega's Mini let you run applications
directly off the USB drive and work with your own data.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSJ0Er

2. NETWORKING NEWS OF THE WEEK
Cisco Spending $12.5M To Buy Nemo
Cisco Systems ay said it plans to acquire Nemo Systems in a deal that
will add network memory technology to its portfolio and enhance its
core switching platforms and service modules.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSK0Es

Big Hurdles Remain For VoIP Deployments: Industry Panel
VoIP may be the next big thing, but it faces security, regulatory,
and business challenges, a panel of industry evangelists warn at
NGN2005.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSL0Et

Verizon Deploys More Fiber, Embraces IP
Verizon is moving toward an all-IP fiber network so it can deploy
more high-bandwidth offerings like the TV service it introduced last
week.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSM0Eu

Cisco Leads LAN Switch Market, But Users Are Grumbling: Survey
Cisco remains the leader in the LAN switch market, but users are
unhappy with the gear manufacturer's prices, and give the vendor
lower ratings this year than last year, according to a new survey.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSN0Ev

3Com Rolls Out WLAN Wares For Branch Offices
3Com this week is expanding its wireless portfolio with a new
wireless LAN switch and access point aimed at branch offices.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSO0Ew

Mobile Users Are Lax On Security: Survey
A survey of attendees at a cellular telecommunications association
conference suggests that even savvy mobile telecommunications users
have been slow to use security technologies on their mobile devices.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSP0Ex

------- Advertisement -------------------
Attend a FREE, live CSI/FBI Roadshow TechWebCast on Computer Crime
and Security. The CSI/FBI Computer Crime and Security Survey is
the world's most widely quoted research on computer crime. Come hear
CSI Editorial Director Robert Richardson, author of the survey, discuss
the findings of the 2005 Survey and what they mean. Robert will be
joined by the FBI, who will discuss how and why to report crime,
and what happens when you do.
Wednesday, October 12, 2005 � 9:00-10:00 AM PT / 12:00-1:00 PM ET
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DdxE0EI

-------------------------------------------

BREAKING NEWS
3. Unattended PCs Security Risk Underestimated
Lonesome PCs pose a security risk that enterprises underestimate, a
research firm said this week.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSQ0Ey

4. Some Voluntary Collection Of Internet Sales Taxes Begins
An important milestone in the effort to tax Internet retail sales
will be reached Saturday.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSR0Ez

5. BlackBerry Maker Wins Round In Ongoing NTP Battle
The U.S. Patent And Trademark Office has rejected all of NTP Inc.'s
claims against Research In Motion Ltd., but it's not over yet.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSS0E1

6. RIAA Sues Another 750 For File Sharing
The Recording Industry Association of America (RIAA) files another
757 lawsuits against people accused of illegally copying digital
music.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkST0E2

TODAY'S MOST POPULAR STORIES
7. Second P2P Tosses In File-Sharing Towel
The president of the company that distributes the eDonkey P2P
software said that under legal pressure from the Recording Industry
Association of America he was giving up.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkEy0EQ

8. Microsoft Pushes Kid's Programming Language
Microsoft has signed on to promote a new programming language
intended to replace BASIC as the first step students take towards
learning how to code.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0Djr20Ex

9. Skype Updates Windows VoIP Offering
Skype Technologies released its Skype Windows version 1.4, as the
VoIP provider moved to add features in the wake of the recent deal
under which it will be acquired by eBay.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkE10EE

10. Big Blue Offers Solutions for Graying Workforce
IBM has announced new consulting services for organizations facing
the loss of baby-boomers as they near retirement age.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkEt0EL

11. IBM Offers 4-Gig SAN Solution
IBM has announced the availability of the new IBM Blade Center 4Gb,
the industry's first fully enabled 4-gigabit-per-second Storage Area
Network solution for blade servers.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkE20EF

--------------------------------------------------------------------
VIDEO -- Eye On IT
In this wrap up of recent items, John Soat reports on the boom in
RFID and FEMA's search for IT specialists.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkSU0E3
--------------------------------------------------------------------
New Blog: Inside Intel's PC Plans
Techweb's new Wolfe Platform Blog delves beneath the surface of
Intel's upcoming plans for dual-core processors, hyperthreading, and
other advanced technologies.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DiSB0Eh
--------------------------------------------------------------------
WEBCAST ALERT: An InformationWeek Market Perspectives TechWebCast --
In Times of Radical Change
Date: Thursday, October 6, 2005
Time: 11:00 AM PT/ 1:00 PM CT/ 2:00 PM ET
Join Brian Johnson, ITIL Co-Author, for the first TechWebCast, In
Times of Radical Change where IT executives can expect to gain a
better understanding of the business perspective on IT, managing
programs and projects to address business driven changes, assessing
the role of IT, and the risk and impact of changes to IT.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0DkLF0Eg
--------------------------------------------------------------------
Sign Up For Info On Our Latest Webcasts
TechWeb's live, interactive webcasts bring the industry's top experts
right to your desktop for in-depth discussions about the market's
most-pressing issues. Click below to receive our weekly update of
upcoming TechWebCasts you won't want to miss.
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0CmhZ0EV
--------------------------------------------------------------------

Subscribe to other TechWeb newsletters:
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0XN0E6

TechWeb: Where critical business technology content is only a click
or two away:
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0RC0Eo

View five days of business technology news by day:
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0Pha0E1

See a TechWeb feature you want to see again?
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0O6G0Ej

Get the vendors' view:
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0CrzP0Ei

More than 20,000 IT terms, more than 20,000 definitions: All at your
fingertips, all in TechEncyclopedia:
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0XQ0EA

Update your subscriber profile:
http://update.techweb.com/cgi-bin4/profile?y=eqxj0Hi7YQ0G4Va

You are subscribed as networking.world@gmail.com.

To unsubscribe from this newsletter:
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0cl0Em

Privacy policy:
http://www.cmp.com/delivery/privacy.html

TechWeb
http://update.techweb.com/cgi-bin4/DM/y/eqxj0Hi7YQ0G4V0RC0Eo
Copyright (c) 2005 CMP Media, LLC
600 Community Drive
Manhasset, NY 11030

Powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy

Data Professionals Survey - Earn $5

-------------------------------------------------------------------

You elected to receive this third party message through the

PostMaster Direct Service at TechNewsletters.com.

-------------------------------------------------------------------

We would like to invite you to participate in our new research project regarding data management tools and technology. If you qualify to complete this survey, you will answer a series of questions regarding your company�s data solutions. You will not be asked to divulge sensitive information. As always, your responses will be kept in strict confidence and your participation today is greatly appreciated.

To show our thanks, you will receive a $5.00 reward for completing this brief survey. It is payable to your PayPal account. Click here to start the process:

http://dsite.us/y?c=1M8A6-BYb.4TwtxN.59p.0&j=1M8A6-BYb&e=4TwtxN

Thank you very much for your participation today. Please note that only one survey may be completed per household and per email address.

Sincerely,
The Survey Direct Team
304 Park Avenue South 7th Floor
New York, NY 10010

No purchase necessary. Open to respondents that complete the survey and are residents of the US and Canada (excluding Quebec) and 18+ years of age. One reward per email address or household. Please allow up to 8 weeks for delivery. Subject to the Survey Direct Reward Program Terms and Conditions:
http://dsite.us/y?c=1M8A6-BYb.4TwtxN.59p.1

------------------------------------------------------------------------
If you wish to be removed from the PostMaster Direct Service, please go to:
http://ntcr.us/u?v=00f0ece70930!20050930000044429!170835&e=networking.world@gmail.com
or contact PostMaster Direct, Attn. Customer Service,
304 Park Avenue South, NY, NY 10010 or call 212-905-5500 x218

Changed your email address recently? Go to:
http://coa.returnpath.net/postmaster/footer/
------------------------------------------------------------------------

#*|FreeTechMail.com|networking|networking.world@gmail.com|20050930000044429|2

John Gallant Spotlights Top Network News and Issues in VORTEX Digest for Sept. 30, 2005

VORTEX Digest
John Gallant Spotlights Top Network News and Issues
Comments to: mailto:jgallant@vortex.net
Sept. 30, 2005
Volume 7, Number 2
*********************************************************
In This Issue:
* Intel developing technologies for emerging markets
* What is Cisco's game plan with AON?
* Do you know about "India's Google"?
* The view from Cisco, live at VORTEX 2005
* Subscription information
*********************************************************
"Opportunity is missed by most people because it is dressed in
overalls and looks like work."

Thomas Edison

(Special note: Just three weeks until VORTEX 2005. Sign up now!
http://www.vortex.net.)

Dear Vorticians,

I picked up that gem of a quote yesterday from Intel Senior
Fellow Justin Rattner, who spoke at MIT Technology Review's
Emerging Technology Conference in the People's Republic of
Cambridge, Mass. Rattner was outlining Intel's efforts to develop
technologies tailored to the needs of consumers in emerging
markets like China and India, including a specially hardened PC
that can be used by entire villages to access the world.
According to Rattner's stats, nearly 80% of the U.S. personal
computer market has been penetrated, compared to less than 5% in
emerging markets.

Rattner was joined on stage by Cisco Chief Development Officer
Charlie Giancarlo, who joined me for lunch after the
presentation. During his on-stage discussion, Giancarlo talked
about how the speed of data center interconnects is coming to
match the speed of computer backplanes, which enables customers
to deconstruct the server as we know it - separating processors
and memory, for example, from the disks - and creating greater
opportunities for virtualization of computing. In essence,
advances in networking are redefining the "computer" as we know
it today and, as a result, changing the role and shape of the
operating system of the future. All of this could go a long way
toward resolving the scaling problems customers face, Giancarlo
claims.

Over lunch, I dived deeply into Cisco's Application Oriented
Networks (AON) strategy, which was rolled out in June. AON has
been met with a mix of confusion, skepticism and intrigue. It
sounds great to talk about how the network will provide better
support for applications - including Web services-based apps -
but what exactly is Cisco planning to do and what will customers
be required to buy and manage?

Some folks positioned AON as simply Cisco's introduction of an
XML switch, but Giancarlo says that's a mischaracterization.
Cisco is beta-testing what he calls a multiprotocol message
router (an MMR, and I'll get to that in a second), but that's
only one step on a longer road toward ensuring that not only do
applications perform better but that the network provides some
intelligence that improves business processes.

For example, he says, the router could look inside a message and
determine that some action needs to be taken - say, a P.O. needs
to be approved by a senior manager - before the information is
forwarded. In addition to the new router, Cisco is providing
lower-level functionality such as compression and app
acceleration that also improve performance.

So what's an MMR?

Well, it's helpful to use an analogy to understand it. A
traditional router moved and translated packets sent among
diverse networks - an IP network, a Novell or Apple LAN or an IBM
SNA environment. Similarly, the MMR will move and translate
messages among diverse message-oriented apps platforms. The
messages could be in an XML format or in the format used by
TIBCO, IBM's MQ Series, EDI messages or proprietary message
formats, among others. The router connects these systems and
rapidly shuttles information back and forth, improving apps
performance. (Message switching has also garnered the attention
of Intel, which recently acquired XML switching company Sarvega.
That move will likely help Intel improve the performance of its
server systems.)

More important perhaps, the router (with its graphical interface)
becomes a single point of change that frees an enterprise from
modifying each of the applications that support its intra-company
or inter-company processes every time business needs change. As
mentioned above, it would also enable enterprises to embed
business logic in the network that could ensure that business
processes are handled in particular ways.

Two questions about this:

1. Do we need or want the network to do this?
2. How will this differ from what Juniper will ultimately deliver
to customers? Juniper has made application acceleration the
centerpiece of its attack on the enterprise and it's clear that
it will be a major front in the war with Cisco. What will Juniper
do differently?

We'll explore both in upcoming issues.

Also, for fun, take a look at this piece in the VORTEX Blog on
"India's Google."
http://www.networkworld.com/weblogs/vortex/2005/010065.html#01006

As always, you can reach me at mailto:jgallant@vortex.net.

*********************************************************
The View from Cisco
Susan L. Bostrom SVP, Internet Business Solutions Group and
Worldwide
Randy Pond, SVP, Operations, Processes and Systems, Cisco Systems

VORTEX 2005: Setting the IT Agenda
Breakthrough to Value
Oct. 24-26 at the Palace Hotel, San Francisco
*********************************************************
Since its emergence during the Internet boom, Cisco has been a
leader in finding breakthrough applications for the Internet. Two
top leaders share where the company is focused today. Sue
Bostrom, is driving the application of IT to Cisco's core
interactions, focusing on moving IT from a transaction-oriented
to an interaction-oriented service. Randy Pond oversees key
productivity improvement initiatives in manufacturing, logistics,
and customer support. In this area, Cisco is working to capture
domain knowledge into IT systems, and thereby free up their most
experienced people for more value-adding tasks.
Register today at http://www.vortex.net/V5E1VD
*********************************************************
Tell a Friend
*********************************************************

Is there a friend or colleague you'd like to have join the
discussions held here at VORTEX Digest? Have them subscribe to
receive the weekly Digest at:
http://www.nwwsubscribe.com/Changes.aspx

*********************************************************
ABOUT VORTEX DIGEST
*********************************************************

VORTEX Digest is a weekly summary of the VORTEX Blogs written by
Executive Producer John Gallant and offers an ongoing dialogue
on matters raised at The VORTEX Conference, and within the VORTEX
Community.

VORTEX is an exclusive, invitation-only event for senior
executives that brings together all the key elements: leadership,
thought, funding, and regulatory expertise, to shape the future
of the network business and the technologies that drive it.
VORTEX shakes off the hype and helps you understand where you can
win new customers, and find new revenue in a time of dramatic and
seemingly unpredictable change.

*********************************************************
SUBSCRIPTION INFORMATION
*********************************************************

To subscribe or unsubscribe to any Network World e-mail
newsletters:
http://www.nwwsubscribe.com/Changes.aspx

To view the VORTEX Blogs:
http://www.networkworld.com/weblogs/vortex/index.html

To access the VORTEX Digest archives:
http://www.networkworld.com/newsletters/vortex/index.html

To unsubscribe from promotional e-mail:
http://www.nwwsubscribe.com/Preferences.aspx

To change your e-mail address, go to:
http://www.nwwsubscribe.com/ChangeMail.aspx

Subscription questions? Contact Customer Service by replying to
this message.

Have editorial comments? Contact John Gallant at
mailto:jgallant@VORTEX.net

For advertising information:
mailto:sponsorships@nwfusion.com

Copyright: Network World, Inc. 2005

NetFlash: Verizon CTO lays out next-gen network plans

NetFlash: Verizon CTO lays out next-gen network plans
09/30/05

In this issue:

* Verizon CTO lays out next-gen network plans
* Users look to buy more LAN switches in 2006, with an eye on
price/performance
* McAfee socks away $50 million in hopes of SEC settlement
* Execs describe Sarbanes-Oxley compliance lessons
* Today on Layer 8
* Links related to NetFlash
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by IBM

Get the most out of your IT with products that help simplify
your infrastructure. So it's easier to manage, which helps save
time, money and resources. Plus help protect your investment
with systems that allow you to add what you need when you need
it. IBM Express Servers and Storage for mid-sized businesses can
help.
http://www.fattail.com/redir/redirect.asp?CID=115817
_______________________________________________________________
REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

http://www.fattail.com/redir/redirect.asp?CID=115656
_______________________________________________________________

NETFLASH: BREAKING NEWS FROM NETWORKWORLD.COM

By Sheryl Hodge

Verizon is planning several network upgrades that will support
new services such as optical VPNs and high-speed home
networking, as well as to reduce data replication among multiple
services.
Verizon CTO lays out next-gen network plans
<http://www.networkworld.com/nlnetflash7906>

Users look to buy more LAN switches in 2006, with an eye on
price/performance

For LAN switch buyers, standards-compliance and
price/performance are key aspects for IT professionals when
choosing a vendor, according to a recent survey.
<http://www.networkworld.com/nlnetflash7907>

McAfee socks away $50 million in hopes of SEC settlement

McAfee has reached a proposed settlement with federal regulators
that the company hopes will end a three-year investigation into
its accounting practices. The software vendor announced Thursday
that it has set aside $50 million to pay an anticipated penalty.

<http://www.networkworld.com/nlnetflash7908>

Execs describe Sarbanes-Oxley compliance lessons

Executives who oversaw the first round of compliance with the
Sarbanes-Oxley Act for their companies say they would have done
things a bit differently in hindsight, including educating more
workers about steps they needed to take, assigning dedicated
staffers to assess and monitor critical controls, and automating
a greater portion of repairs to IT controls deemed deficient.
<http://www.networkworld.com/nlnetflash7909>

Today on Layer 8, sanitized for your protection:

Firefox losing momentum?; Yahoo accused of stealing trade
secrets, engineers; some cities cry foul over iPod subway maps;
and eight charged over Star Wars leak; all this today and more
at your home for not-just-networking news.
<http://www.networkworld.com/weblogs/layer8/?net&story=layer8>

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlnetflash7614>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlnetflash7875>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlnetflash6921>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlnetflash7779>
5. The rise of the IT architect
<http://www.networkworld.com/nlnetflash7042>

_______________________________________________________________
To contact: Sheryl Hodge

Sheryl Hodge is the Senior Online Copy Chief for Network World
Fusion. She can be reached at <mailto:shodge@nww.com>
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=115988
_______________________________________________________________
ARCHIVE LINKS

NetFlash breaking news:
http://www.networkworld.com/news/netflash.html
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Thursday, September 29, 2005

Wireless Strategies: Linux drivers for wireless network cards?


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 September 30, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: Linux drivers for wireless network cards?

›› In the news:
- Mobile phone security standards coming next year
- RIM agrees to use Intel's Hermon mobile chip


›› Go figure: RFID tags shrinking rapidly

›› ITwhirled: Psst: Want to know my net worth?

›› From the network:
- Building an Enterprise Communications Strategy Beyond Voice Mail


›› FEATURE

Linux drivers for wireless network cards?

Getting your Linux machine connected to a WLAN can still be tricky, especially if you're using a USB adapter. Read on for some tips for taking the penguin wireless.


›› IN THE NEWS

Mobile phone security standards coming next year
Vendors push for enterprise mobility
RIM agrees to use Intel's Hermon mobile chip
Mobile search helps users find nearby fun

Get the latest news here...


›› GO FIGURE

60 percent
Reduction in size in PanGo's RFID tags in just one year.
Source: Computerworld

›› ITWHIRLED

Psst: Want to know my net worth?
With chronicles of budgeting, saving, spending and investing habits popping up all over the blogosphere, "personal" finance may just be a thing of the past. What, you may ask, would inspire someone to expose their deepest, darkest financial secrets? According to Charlene Li, a principal analyst at Forrester Research, "It's the same reason why someone has a Web page or why people feel comfortable going on reality TV."

More offbeat news, reviews and other stuff...

Advertisement



FROM THE NETWORK:

Take Advantage Of The Latest Mobile Workplace Services Offerings
Today, PC management best practices are benefiting mobile services, extending from asset management through break/fix, help desks, and even the carrier network. Learn more in this new Webcast now.

Building an Enterprise Communications Strategy Beyond Voice Mail
Enterprise communications are changing. How will these changes affect you? Hear leading analysts discuss the future of enterprise communications and how to develop your own enterprise communication strategy. Go now.

Redefining Human-Centric Process Management - New Webcast
In today's business environment, BPM has more value than ERP, CRM or any other value chain activity. Watch this webcast and discover what's required in making your people-centric process management projects more successful. Go now.

Distributing Financial Accountability - New Webcast
See how others have been able to distribute financial accountability throughout the enterprise, ultimately improving their financial performance. Watch this new Webcast now.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

Broadband Mobile Satellite Modem
Mobile data transfer at up to 3 times speed of GPRS, coverage in 99 countries, packet data service so you are charged for data transferred not time spent online.
Buy, Sell or Rent Used Cisco Equip-Save up to 85%
Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.
Wireless LAN Management
Enterprise-class wireless LAN Management software to secure, Configure & Monitor WLAN from all known Intrusions & Attacks
assyst by Axios Systems - Wireless ITSM solutions
Our mobile solutions enable technicians and remote workers to update and action events using the latest PDAs & Blackberries etc - Regsiter Online for more information
FirstSpot - Wi-Fi Hotspot wireless gateway
Wi-Fi Hotspot Management Software for Windows - various enhancements include Data Transfer tracking and Quota System, Hour-pass/day-pass, RADIUS Authentication Mode, Client Isolation and more ...
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.



U3 and Realm Systems unchain mobile workers from their laptops

NETWORK WORLD NEWSLETTER: KEITH SHAW ON WIRELESS COMPUTING
DEVICES
09/29/05
Today's focus: U3 and Realm Systems unchain mobile workers from
their laptops

Dear networking.world@gmail.com,

In this issue:

* DemoFall presenters aim to make life easier for mobile workers
* Links related to Wireless Computing Devices
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=116019
_______________________________________________________________
IS IT THE NETWORK OR THE STORAGE THAT'S THE PROBLEM?

Midsize and larger businesses often find their IT topology has
become a complex mix of servers, networks and storage systems.
Many of these companies also route long-haul traffic over
fiber-based networks - metropolitan-area networks, WANs and
private optical networks. Who's responsible when a
storage-related problem occurs on a fiber network? For more,
click here:
http://www.fattail.com/redir/redirect.asp?CID=115704
_______________________________________________________________

Today's focus: U3 and Realm Systems unchain mobile workers from
their laptops

By Keith Shaw

Continuing the coverage of DemoFall 2005, I ran across two
companies taking different approaches to a similar problem -
mobile workers who need access to corporate applications but who
don't want the hassle of bringing a VPN-enabled laptop along
with them while they travel.

I was already aware of the first company U3, as I'd written
about its U3 platform for USB SmartDrives in a previous
newsletter <http://www.networkworld.com/nlmobile7487>. To
refresh the memory, a USB SmartDrive with the U3 platform on it
will let users carry a personal workspace with them wherever
they go. Not only will data and files be allowed, but also a
user's software applications and settings will be stored on the
drive with them. In addition to bringing this stuff with them,
users will also feel secure in that any PC they end up using
will not leave any trace of information on the device after they
are finished.

At least four USB flash drive manufacturers debuted products
with U3 - I got samples from Verbatim (an impressive 1G-byte
capacity SmartDrive), SANdisk, Kingston Technologies and
Memorex. Once I get the drives to recognize applications and
data stored on my work laptop (I was traveling with a
non-production notebook for the DemoFall show), I'll give an
update on the different devices.

The second company taking a different approach to the same
problem is Realm Systems, which at the show launched its Mobile
Personal Server (1400E) device, a server that can fit in your
pocket. The secure and platform-independent device can plug into
the USB port of any computer (regardless of operating system)
and lets the user safely and securely access any corporate
applications and services.

An impressive part of the Realm Systems demo was the fact that
the MPS can remember the state of the application if a user
switches computer systems in midstream. For example, a user can
begin a word processing document, unplug the device and then
plug it into a separate computer and continue to work from the
exact same spot (this has to be seen to be believed). The MPS
device includes a biometric fingerprint scanner for
authenticating users to the applications and has other security
features that should please IT managers trying to support a
mobile work force. More details are available at the Realm
Systems Web site <http://www.realmsys.com/>.

Our coverage of DemoFall companies in the mobility space will
continue next week - it turns out that day 2 of the show
includes many other mobile phone-related products and
applications. If you can't wait, remember you can always just
access the Network World DemoFall blogs
<http://www.networkworld.com/community/?q=taxonomy/term/213> and
see what we wrote about last week.

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlmobile7747>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlmobile7876>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlmobile6979>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlmobile7877>
5. The rise of the IT architect
<http://www.networkworld.com/nlmobile7186>

_______________________________________________________________
To contact: Keith Shaw

Keith Shaw is Senior Editor, Product Testing, at Network World.
In addition, he writes the " Cool Tools
<http://www.networkworld.com/columnists/cooltools.html> "
column, which looks at gizmos, gadgets and other mobile
computing devices.

You can reach Keith at <mailto:kshaw@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=116018
_______________________________________________________________
ARCHIVE LINKS

Archive of the Wireless Computing Devices newsletter:
http://www.networkworld.com/newsletters/mobile/index.html

Keith Shaw's Cool Tools:
http://www.networkworld.com/columnists/cooltools.html
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Users deploy ultra-reliable rings for high-speed data access

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND JIM METZLER ON WIDE
AREA NETWORKING
09/29/05
Today's focus: Users deploy ultra-reliable rings for high-speed
data access

Dear networking.world@gmail.com,

In this issue:

* Vendors describe how their customers provide high-speed access
to data centers
* Links related to Wide Area Networking
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=116015
_______________________________________________________________
IS IT THE NETWORK OR THE STORAGE THAT'S THE PROBLEM?

Midsize and larger businesses often find their IT topology has
become a complex mix of servers, networks and storage systems.
Many of these companies also route long-haul traffic over
fiber-based networks - metropolitan-area networks, WANs and
private optical networks. Who's responsible when a
storage-related problem occurs on a fiber network? For more,
click here:
http://www.fattail.com/redir/redirect.asp?CID=115702
_______________________________________________________________

Today's focus: Users deploy ultra-reliable rings for high-speed
data access

By Steve Taylor and Jim Metzler

In our last newsletter, we discussed the plans that user
organizations have for providing high-speed access into their
data centers. That newsletter was based on discussions we had
with Michael Howard of Infonetics. In today's newsletter, we
will examine the same topic, but this time based on
conversations we had with Rich Klapman, group manager of
converged packet access services at AT&T, and John Labourdette,
regional solutions architect manager at Verizon.

Klapman commented that since Sept. 11 companies have been
aggressively examining their disaster recovery options. In many
cases, he sees the requirement to ensure business continuity is
as much a driver of the need for reliable high-speed access as
is server consolidation. In either case, Klapman sees that
companies are often deploying ultra-reliable rings between their
data centers that are located in the same general area. Many
companies have also deployed a "bar-bell configuration" in which
they have high-speed rings in two cities and connect these rings
with a high-speed Ethernet link.

Labourdette expressed a similar view and said that Verizon's
customers are implementing high bandwidth links between their
data centers based on a variety of technologies such as Dense
Wave Division Multiplexing (DWDM) or SONET rings, with customers
requiring higher speeds tending to use DWDM based rings.

Kaplan noted a method of supporting high-speed access by adding
Resilient Packet Ring to the mix and said that he is seeing a
large and growing interest in Ethernet private line. He also
commented that there are a variety of ways that carriers price
their high-speed services. He noted that carriers incur a fixed
cost to light up a building and that some carriers recover that
cost by charging a large up-front fee, while others price the
first circuit as a loss-leader in the hopes of recouping their
investment by selling additional circuits to the customer.

Labourdette stated that he too was seeing companies using
Ethernet for high-speed access, and using it in part to support
storage networking. He stated that the pricing structure for
Verizon's DWDM and SONET services are typically distance
sensitive. In the cases in which the rings are devoted to a
single customer, there is also a cost for various components
such as multiplexers.

Our next two newsletters will discuss data center access from
the perspective of the user organization.

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlwan7765>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlwan7889>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlwan6977>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlwan7846>
5. The rise of the IT architect
<http://www.networkworld.com/nlwan7088>

_______________________________________________________________
To contact: Steve Taylor and Jim Metzler

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials <http://www.webtorials.com/>, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
<mailto:taylor@webtorials.com>

Jim Metzler is the Vice President of Ashton, Metzler &
Associates, a consulting organization that focuses on leveraging
technology for business success. Jim assists vendors to refine
product strategies, service providers to deploy technologies and
services, and enterprises evolve their network infrastructure.
He can be reached at <mailto:jim@ashtonmetzler.com>
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=116014
_______________________________________________________________
ARCHIVE LINKS

Archive of the WAN newsletter:
http://www.networkworld.com/newsletters/frame/index.html
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

How IT managers prepped their servers for Hurricane Rita

NETWORK WORLD NEWSLETTER: DENI CONNOR ON SERVERS
09/29/05
Today's focus: How IT managers prepped their servers for
Hurricane Rita

Dear networking.world@gmail.com,

In this issue:

* IT managers prepared servers for Rita
* Links related to Servers
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by IBM

Get the most out of your IT with products that help simplify
your infrastructure. So it's easier to manage, which helps save
time, money and resources. Plus help protect your investment
with systems that allow you to add what you need when you need
it. IBM Express Servers and Storage for mid-sized businesses can
help.
http://www.fattail.com/redir/redirect.asp?CID=115821
_______________________________________________________________
IS IT THE NETWORK OR THE STORAGE THAT'S THE PROBLEM?

Midsize and larger businesses often find their IT topology has
become a complex mix of servers, networks and storage systems.
Many of these companies also route long-haul traffic over
fiber-based networks - metropolitan-area networks, WANs and
private optical networks. Who's responsible when a
storage-related problem occurs on a fiber network? For more,
click here:
http://www.fattail.com/redir/redirect.asp?CID=115696
_______________________________________________________________

Today's focus: How IT managers prepped their servers for
Hurricane Rita

By Deni Connor

With Hurricane Rita only a harrowing memory for IT managers in
Texas last week, their mantra for protecting servers, if they
didn't have server replication in place, was largely "back up
their data, take them down, cover them up and get out of the
building."

Hurricane Rita slammed Texas businesses Saturday morning and
caused the evacuation of 1.3 million people from Gulf Coast
cities like Galveston, Corpus Christi and Houston.

Here's what some IT managers did with their servers prior to
Rita's wrath.

Although Todd Coury, network manager for law firm Andrews Kurth
in Houston, didn't answer his phone or return Network World's
calls, we know that his servers are protected by MessageOne's
OneSwitch service. In a previous interview, Coury said he uses
OneSwitch to replicate his Windows applications and data to
Dallas.

"We are replicating data from Houston to a disaster recovery
[storage-area network] in Dallas, so if Houston goes offline, we
can continue to work with the Houston data, even if the network
is unavailable in Houston," Coury said.

"With OneSwitch, I can log in from home or from anywhere and
fail over our key systems to our Dallas office," he said.
"Before, I would have had to go onsite and fail over our
systems." OneSwitch provides automated replication and failover
during a disaster or system failure.

Other IT managers in Houston reported that they were battening
down their businesses for Rita's approach.

James Taylor, IT manager for SPX Valves and Controls in Houston,
spent last Wednesday and Thursday preparing for Rita. "We're
doing backups on the server and we push data up to our
Charlotte, N.C., location just in case the server gets buried."

Taylor thought about moving his servers out of the facility, but
decided against it.

"Right now trying to get out of Houston is impossible - you
really risk getting into a wreck, and the servers are safer
here," Taylor says. "We are going to tie them down, move the low
servers to the top of the rack, unplug everything and then cover
them up."

Greg Arnold, CIO for Big Dog Logistics in Houston, chose
LiveVault's InSync vaulting service to protect his servers.

"Starting this evening, we are going to being transferring all
our data to some servers in Atlanta," Arnold says.

"We put in LiveVault for lots of reasons, Hurricane Allison
being one of them," Arnold says. "Keeping tapes and transferring
them around, they get lost and damaged. The Internet being what
it is we can transfer data to another location and resume
operations from around the world."

Arnold has set up a business center in North Houston where some
key individuals will work out of a home.

RELATED EDITORIAL LINKS

Wireless: Volunteers give voice to evacuees
Network World, 09/19/05
http://www.networkworld.com/nlservers7579

Volunteers rebuild Gulf Coast communications with wireless nets
Network World, 09/16/05
http://www.networkworld.com/nlservers7580

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlservers7744>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlservers7881>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlservers6971>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlservers7882>
5. The rise of the IT architect
<http://www.networkworld.com/nlservers7144>

_______________________________________________________________
To contact: Deni Connor

Deni Connor is a Senior Editor at Network World covering
storage, Unix, Novell, Macintosh and IT in Healthcare. You can
reach her at <mailto:dconnor@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=116000
_______________________________________________________________
ARCHIVE LINKS

Archive of the Servers newsletter:
http://www.networkworld.com/newsletters/servers/index.html

Servers/Desktop Research Center:
http://www.networkworld.com/topics/servers-desktops.html
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Storage wise-guy readers respond to recent newsletters

NETWORK WORLD NEWSLETTER: MIKE KARP ON STORAGE IN THE ENTERPRISE
09/29/05
Today's focus: Storage wise-guy readers respond to recent
newsletters

Dear %%fullname%%,

In this issue:

* Delving into Karp's mailbag
* Links related to Storage in the Enterprise
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Ciena
Free White Paper: Best Practices for Networks for Storage
Replications over Any Distance

Learn how the right storage extension implementation can enable
strategic competitive and cost advantages with high-performance,
low-cost data center connectivity--supporting virtually all
time-sensitive, mission-critical applications enterprise-wide.
Free white paper courtesy of Ciena.
http://www.fattail.com/redir/redirect.asp?CID=115885
_______________________________________________________________
IS IT THE NETWORK OR THE STORAGE THAT'S THE PROBLEM?

Midsize and larger businesses often find their IT topology has
become a complex mix of servers, networks and storage systems.
Many of these companies also route long-haul traffic over
fiber-based networks - metropolitan-area networks, WANs and
private optical networks. Who's responsible when a
storage-related problem occurs on a fiber network? For more,
click here:
http://www.fattail.com/redir/redirect.asp?CID=115698
_______________________________________________________________

Today's focus: Storage wise-guy readers respond to recent
newsletters

By Mike Karp

E-mail from readers is often interesting. Typically, what I get
falls within one of three categories, which I tend to refer to
as "screamers," "askers" and "wise guys."

"Screamers" - mostly, marketing managers from some vendor I did
NOT mention in this column - spend most of their time pointing
fingers at me and accusing me of only covering my clients and my
friends. I point out to them that this is not the case (sure,
sure), and that I often go to some length to ensure that all
companies are fairly represented - vendors are always listed
alphabetically (really? Yup, check it out); if I mention a
client I also try to mention a non-client and give them the same
amount of space (wow, he really is a good guy!), and so forth
(but he still can't date my sister).

Screamers are rarely convinced, however. The truth of the matter
is that most of the companies I don't talk about are companies
that have never gotten around to briefing me. Lacking any effort
on their part to provide information ...

Group 2, the "askers" - usually IT folks with legitimate
questions. These often spawn some terrific e-mail exchanges, and
I have many pen pals from all over the world (due to
translations, it turns out that I have become eloquent in
languages I never even knew I spoke). I typically give over a
large part of Friday mornings to this correspondence.

And then there are the "wise guys" - a group of readers who, if
truth be told (as on occasion it is), really have some wisdom to
share. They suggest interesting topics for me to write about,
offer interesting commentary (and sometimes suggestions for my
readers, which I often publish), and on many occasions catch me
when I have erred. Over the past four years, my readers have
really benefited from many of their contributions.

R., in California caught me making a misleading comment last
week when I talked about Serial-attached SCSI and Serial ATA
<http://www.networkworld.com/nlstorage7695>. He quoted my
statement that with SATA and SAS, resellers will be building
systems that move data on and off disks at twice the speed of
the previous generation of machines that used parallel I/O. R.,
wrote: "My question is in regards to the speed you quoted. My
understanding is that SAS drives operate at 300M byte/sec and
current SCSI parallel technology is at 320M byte/sec. Am I in
error? How does this result in off-disk rates for SAS at twice
the rate of SCSI?"

R, unlike many Californians, was quite right, of course. The
reference to doubled speed only applies to SATA right now, which
goes from 1.5G-bit I/O to 3G-bit. The current 3 G-bit rate for
SAS doesn't get bumped up to 6G-bit until 2006 or 2007. I should
have been clearer on that.

Correspondent Kasey, also a wise guy, liked the stories I did on
the $400 storage-area network
<http://www.networkworld.com/nlstorage7696>, but pointed out
important issues that I completely neglected to mention. Given
that many users of this equipment will be somewhat inexperienced
in the ways of storage, Kasey's issues were:

* Low-end storage usually requires host-based back-up software
to complete a backup, which means that consumers will need to
upgrade networks to Gigabit Ethernet to allow for a decent
back-up window of under 20 hours. (I am not sure about this, but
the back-up issue is not one to be taken lightly.)
* As small and midsize businesses store more data, it is
important to impress on them the need for storage management -
carve the storage into small sizes that fit their backup
solution, apply good data policies that are enforced by
management.

Two small points, but also rules to live by. And yes, Kasey, I
will be writing much more on the data lifecycle.

You will note that members of the "wise guy" category are very
much appreciated by this writer. Feel free to join them if the
spirit moves you.

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlstoragealert7669>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlstorage7887>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlstoragealert6931>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlstorage7888>
5. The rise of the IT architect
<http://www.networkworld.com/nlstoragealert7268>

_______________________________________________________________
To contact: Mike Karp

Mike Karp is senior analyst with Enterprise Management
Associates, focusing on storage, storage management and the
methodology that brings these issues into the marketplace. He
has spent more than 20 years in storage, systems management and
telecommunications. Mike can be reached via e-mail
<mailto:mkarp@enterprisemanagement.com>.
_______________________________________________________________
This newsletter is sponsored by Ciena
Free White Paper: Best Practices for Networks for Storage
Replications over Any Distance

Learn how the right storage extension implementation can enable
strategic competitive and cost advantages with high-performance,
low-cost data center connectivity--supporting virtually all
time-sensitive, mission-critical applications enterprise-wide.
Free white paper courtesy of Ciena.
http://www.fattail.com/redir/redirect.asp?CID=115884
_______________________________________________________________
ARCHIVE LINKS

Archive of the Storage newsletter:
http://www.networkworld.com/newsletters/stor/index.html

Breaking storage news and analysis:
http://www.networkworld.com/topics/storage.html
_______________________________________________________________
The dynamic world of application acceleration technologies

Companies are undergoing a shift in the way they structure their
internal IT departments and external service components. Find
out about the changing market for application acceleration
technologies.
http://www.fattail.com/redir/redirect.asp?CID=115743
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here :
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: %%emailaddr%%
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Novell does have an IM client

NETWORK WORLD NEWSLETTER: DAVE KEARNS ON NOVELL NETWARE TIPS
09/29/05
Today's focus: Novell does have an IM client

Dear networking.world@gmail.com,

In this issue:

* Readers remind us of IM client in GroupWise
* Links related to Novell NetWare Tips
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=115994
_______________________________________________________________
COMPLIMENTARY NETWORK WORLD PRINT SUBSCRIPTIONS

Managing networks and systems can be a lot easier if you stay
aware of the latest developments in tools and technologies
designed to help. Network World will ensure that you don't miss
a beat. We would like to offer you the leading source of
dependable, accurate, timely information you can rely on to make
the best decisions for your corporate network. SUBSCRIBE TODAY
AT:
http://www.fattail.com/redir/redirect.asp?CID=115876
_______________________________________________________________

Today's focus: Novell does have an IM client

By Dave Kearns

A couple of weeks ago, in musing about a potential ZENworks for
instant messaging application
<http://www.networkworld.com/nlnovell7577>, I waxed lyrical
about Google's new open source IM client and how Novell - which
is adopting all things open source seemingly willy-nilly - might
developed a synergy between Eric Schimdt's current employer
(Google) and his previous one (Novell).

What a number of you gently pointed out to me was that Novell
already has an IM client - GroupWise Messenger - first
introduced with GroupWise 6.5. GW Messenger is a far cry from
the SEND.EXE and BROADCAST 25th line messages of the old
NetWare, by the way. In its product literature
<http://www.novell.com/products/groupwise/messenger/>, Novell
describes GW Messenger as:
"...a secure, open standards-based and policy-based instant
messaging system that allows employees to communicate in
real-time, permitting faster decision making while protecting
information behind the firewall. Employees can determine
personal availability, and communicate and transfer files - all
behind the safety of the corporate firewall. GroupWise Messenger
also enables an organization to extend instant messaging
securely beyond the firewall to partners and suppliers using a
[VPN]. Administrators can set policies to log instant messaging
communications system-wide, by groups or by individuals,
simplifying management and control."

Secure, efficient, manageable and controllable IM - that's a big
promise Novell is making. Does it deliver?

Security features of GW Messenger include:

* Directory authentication - All users must first authenticate
through Novell eDirectory to keep out unauthorized people.
* Secure communication - GW Messenger encrypts all
communications (client-to-server and server-to-server) using SSL
encryption, so eavesdroppers can't tap into sensitive
information.

* User conversation recording - Users can record conversations
on a private file for their own use, so they have an audit trail
of sensitive conversations.

* Corporate conversation archive - GW Messenger can be set to
archive conversations on an encrypted log file that's available
only to trusted users.

* True user identities - Because GroupWise Messenger is
integrated with Novell eDirectory, users know their contacts'
true identities instead of only aliases or screen names.

Management is policy based using a plug-in to ConsoleOne, and is
integrated with eDirectory.

Today's younger employees have IM on their own computers and
"texting" on their cell phones as integral parts of their daily
lives. They expect the same sort of facility in their business
life. There's probably IMing on your network right now; wouldn't
you rather have secure, manageable IM?

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlnovell7734>
2. IPTV will trip up Bells, analysts say
<http://www.networkworld.com/nlnovell7878>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlnovell6964>
4. Skype: Hazardous to network health?
<http://www.networkworld.com/nlnovell7879>
5. The rise of the IT architect
<http://www.networkworld.com/nlnovell7181>

_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=115993
_______________________________________________________________
ARCHIVE LINKS

Archive of the Novell NetWare Tips newsletter:
http://www.networkworld.com/newsletters/netware/index.html

Novell news page:
http://www.networkworld.com/news/financial/novell.html
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005