Monday, July 16, 2007

Dual-mode expected to spur VoIP on wireless LANs; Juniper enhances branch-office gear

Network World

Daily News: PM




Network World Daily News: PM, 07/16/07

Dual-mode deployments expected to spur VoIP on wireless LANs
While VoIP over Wi-Fi, also called voice-over-wireless LAN (VoWLAN) is growing, making it possible to transfer ongoing calls to cellular networks will increase adoption of VoWLAN.

Juniper enhances branch-office network gear
Juniper introduces two new multifunction hardware platforms for small offices that fit into both Juniper’s SSG and its J-Series product lines, depending on which operating system is installed.

Mounting scrutiny for Google security
Much as the ubiquity of Microsoft's Windows operating system and Office productivity tools has made the software giant a focal point of security research, search giant Google is facing new scrutiny as it diversifies its products and moves further into ...

Optimize Your WAN: Network World Shows You How

In this Executive Guide learn how optimization can supercharge your WAN.

Click Here

Seeks MPLS advice

Ric's company is getting ready to build a new MPLS network and is considering gear from Cisco (C7600), Juniper (M120) and Alcatel (7750 with graphical management system 5620SAM). He's looking for any suggestions or advice from folks who have used or compared these products.

In depth

Crunch time for EMC stock
Customers and industry analysts agree that the company has made great strides over the past few years in laying out its strategy and in making key acquisitions aimed at filling out its portfolio. But they also agree that EMC still has work to do.

New methodologies for 'bottomless' e-mail storage
With e-mail the dominant enterprise communication vehicle - used for everything from simple notes to purchase orders, contracts, invoices and other critical business documents - managing swelling message stores has become a primary concern.

From the blogs and forums

Mark Kadrich wonders if we can really trust a key component of Microsoft's NAC effort. Greg Royal begins to despair that he will ever see actually technology benefits from the Nortel/Microsoft partnership. Doug Alger considers how much data-center downtime is caused by human error.

Miles Baska ponders the old Echelon read-all-e-mail effort by the NSA. Rand Morimoto discusses Microsoft Office Communications Server 2007. Paul McNamara reports that after complaining publicly about his Verizon FiOS service, he gets a call from somebody at the competing Comcast. He also breaks the news about a data breach at the Disney Movie Club. Brad Reese reports on a Cisco password cracker that works against old type-7 passwords. Susan Hanley discusses blogs behind the firewall. Jeff Doyle explains the importance of IPv6 feasibility studies.

Reports are streaming in from users about system-locking ransomware from "Glamorous team." Users discuss the case of the ex-Boeing employee accused of stealing documents - could Boeing have done more to prevent the theft?

Connie Twynham writes that with Boomers increasingly retiring, IT managers need to figure out how to harvest their years of knowledge before they walk out the door. One user writes we left one simple but vital skill off our list of 12 IT skills you must have.

Users consider whether e-mail/VoIP start-up Yoomba is just a new spam vector. Users discuss Microsoft, OpenXML and Massachusetts document standards. Bhupender seeks help on tracking down a duplicate MAC address on a wireless network.

Users debate Cisco's impending features, price changes for IOS.

How to

There's more to securing your network than just plugging in the latest devices and patches. In our new bi-weekly Network Guardian column, we'll take a look at the nitty-gritty of locking down your network. In the first column, Andre Gold discusses how to limit what contractors can do on your network without making them feel you don't trust them.

Ron Nutter helps a user find the best method for blocking spam on a Solaris server. Andrew Lockhart provides the latest example of why you shouldn't be using WEP on your wireless network anymore - a new cracking technique.

More news

EMC upgrades garner praise on 'green' benefits
EMC's Symmetrix, Clariion, Celerra and Centera gear getting new capabilities with an emphasis on greater capacity and lower power consumption.

"Call my e-mail," Yoomba says
Brand-new start-up Yoomba launches a free service that lets e-mail users place VoIP calls or start instant messaging sessions with any other e-mail address.

Illinois puts pizazz back in PKI
State of Illinois had placed a big bet on public-key infrastructure (PKI) for e-commerce, but that was becoming a losing bet three years ago as state agencies floundered with issuing digital certificates. But a drastic change to centralize certificate issuance through the Illinois IT department saved the project, among the most ambitious for PKI in the country.

As image spam declines, PDF spam ready to take its place
Vendors agree image spam is finally on the decline, but a new scam called PDF spam is emerging to take its place.

Oracle hopes new features will speed up 11g adoption
Oracle is hoping that new security, testing and management features offered in Oracle Database 11g, will lead users to migrate to the major release of the vendor's database sooner rather than later.

Ballmer lays out future of software, services
Microsoft CEO Steve Ballmer says traditional software will transition over time to hosted services while incorporating the best of today's desktop and device interfaces.

TODAY'S MOST-READ STORIES:

1. Ex-Boeing worker accused of stealing documents
2. No breakthrough in efforts to unlock the iPhone
3. After criticism, Sun fixes Java flaw
4. 12 IT skills that employers can't say no to
5. Workaround puts Skype on iPhone
6. Cisco IP telephony software open to DoS attacks
7. Google Earth captures China's new ballistic-missile sub
8. Spam filter costs lawyers their day in court
9. New botnet targets iPhone buyers
10. Top 25 iPhonies: the nano edition

MOST E-MAILDED STORY:
15 great, free security programs


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: