Monday, November 12, 2007

The best all-in-one firewalls; Google offers $10 million for best Android phone applications

Network World

Daily News: PM




Network World Daily News: PM, 11/12/07

Review: 'All-in-one' firewalls fall short
Are there unified threat-management firewalls with the chops to provide the perimeter-security functions that an enterprise needs? In this Clear Choice Test, we set out to determine whether we could find a UTM firewall that could scale up successfully in performance, feature set and manageability. We tested 11 different offerings; find out which one scored highest.

Google offers $10 million for best Android mobile phone applications
Google will give $10 million to the developers who build the best applications for Android, the open source platform Google designed for building mobile phones.

Sun shoots for the stars with Constellation HPC
Sun is shipping its new Constellation high-performance computing product, marking a return to the HPC market it had left in the late 1990s to ...

Find out why WAN Optimization is Right for You

Discover how you can realize a three to four month return on investment with WAN optimization tools in this informative Webcast. Learn how all WAN optimization products are not the same and how to find the right box for your organization.

To find out more click here.

Network World bloggers

New bloggers: Joe Chapman will be writing about "your network, the edge of the service provider network and the space in between," for example, VLANnumbers and service providers. Google Gal by Network World Audience Development Director Chrystie Terry, is all about Google, from search to its social networking efforts.

James Gaskin reiterates his stand that there's no reason for SMB companies to upgrade to Microsoft Vista yet.

Brad Reese explains how to recover from a Cisco router crash. Jeff Doyle discusses 21st-century network design. Michael Morris looks at separating network design and the CCIE.

Chris Amaris shows how to deal with that Ross Mistry looks at new features and functionality in Microsoft SQL Server 2008. annoying Microsoft problem: You find a Knowledgebase article about a problem that tells you to contact Microsoft to get the patch. Tyson Kopczynski continues his look at using PowerShell to take Virtual Server snapshots.

Michael Dortch writes users should kick the tires of Microsoft's new free enterprise search server - cautiously. Ron Colonna considers Microsoft's eLearning.

Jamey Heary posts his Christmas security wish list. Miles Baska considers cyberjihad. Deb Radcliff looks at a new exploit spreading through MySpace musician pages.

Greg Royal considers the effect of Google's phone efforts on the pre-paid market. Alex Lewis is sad there won't be a gPhone.

Paul McNamara says it's about time for the FCC to crack down on cable companies. Adam Gaffin provides the 1994 pilot of "24." Mark Gibbs makes his peace with Bayes. Jeff Caruso wonders if the iPhone deserves to be Time's invention of the year.

Network World user discussions

David503 reports on how to eliminate Web redirect pages on Verizon FiOS. Meatpieandtatters wonders how much more IBM can squeeze workers while doing things like dropping $5 billion on Cognos. Drew Tick analyzes the failure of the Spring/Clearwire WiMAX project. Jeff Helm explains why regulators need to step in to ensure network fairness. Meanwhile, readers get into a debate with Network World columnist Andreas Antonopoulos on network neutrality.

How to

Ron Nutter helps a user with a question about voice and data running on Cat 5 cabling.

Podcasts

Stuffing 10 pounds of data in 5-pound pipe
How did First Command Financial Planning Services manage to pack 70 megabytes of data through a 22 megabyte pipe to speed disaster recovery systems? Kevin Dunn, director of network operations, First Command Financial Planning explains on this edition of Voices from IT Roadmap.

In depth

A proactive approach to e-discovery
In December 2006 the U.S. Federal Rules of Civil Procedure were amended to address electronically stored information, with the result that ESI is now subject to discovery, meaning it can be requested as evidence in court cases. Most corporate legal departments understand these changes, but many company management teams and departments that create and manage ESI may not be aware of their exposure should they get involved in litigation. The consequences of not creating a proactive electronic discovery (e-discovery) process can be fines, unfavorable judgments and increased operating costs.

More news

Social networking finding friends in enterprise
Speakers at the first Defrag Conference held in Denver say social networking tools, including blogs, wikis and bookmarking, are quickly becoming the latest Internet trend to seek an IT-sanctioned home behind the corporate firewall. Experts say enterprise benefits being articulated, awareness growing, but adoption is still a ways off

Dell's acquisition of EqualLogic a good fit, analysts say
Dell's acquisition of IP storage-area network (SAN) vendor EqualLogic is being met with approval from analysts who say the deal fits well into Dell's storage strategy.

PCI compliance mandate's power raises conflict-of-interest questions
The Payment Card Industry security standard shows its power to drive product decisions among enterprises, and raises conflict-of-interest questions.

Microsoft dives into enterprise search with free server
Microsoft ups ante in battle with Google, others to provide enterprise search across corporate systems while easing adoption, rollouts

10G Ethernet data-center switch on tap
Arastra, an Ethernet data center switch start-up, this week unveiled its first products: a line of switches that include a 1 rack unit chassis sporting 48 10Gbps ports at $400/port.

MOST-READ STORIES:
1. 5 cool wireless research projects
2. MIT's amazing, foldable, stackable car
3. IBM agrees to buy Cognos for $5B
4. Networking's 50 greatest arguments
5. IPv6: Will matter to enterprises in five years
6. When the patient is a Googler
7. 10 career killers to avoid
8. Testing All-in-one Firewalls
9. Verizon defends redirecting typo traffic
10. Googled sued over distributed search patent

MOST-READ REVIEW:
Testing All-in-one Firewalls


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment