Monday, December 10, 2007

Apple's Leopard is spotty

Daily News PM Alert Network World logo
NetworkWorld.com | LANs & WANs Research Center | Update Your Profile

Apple OS X Leopard Server offers minor platform improvements while sporting some new collaboration applications, our review finds.


SPONSORED BY NOMINUM
rule

Live Webcast: DNS creator shares best practices
Join DNS inventor Paul Mockapetris for a Live Webcast 2 p.m. Eastern/11 a.m. Pacific, Tuesday, Jan. 15, and learn best practices for deploying a secure, resilient and high-performing DNS architecture. Learn how to check your DNS setup in order to support fast-growing mission-critical networks. Register today for this Live Webcast.

rule
RELATED NEWS:

In depth

NBA: Your last line of defense
Network Behavior Analysis tools fill the void left by static security products such as firewalls, which simply enforce pre-existing policies, and intrusion-detection/prevention systems, which detect and block attacks based on known signatures.

Five ways to improve storage power efficiency
Anyone responsible for managing a data center understands the increasing importance of power efficiency. This is especially the case in data centers where consolidation and higher-density equipment has packed more and more devices into less floor space.

Network World Community

Jamey Heary looks at the five coolest security features and products released by Cisco this year. Brad Reese declares: Cisco enterprise wireless market share receives thrashing from Nortel. Wendell Odom looks at the road to the lab exam. Michael Morris considers the network design process.

Eoghan says as important as certifications are, even better would be if management finally told know-it-all users to butt out.

Users debate the strange case of Microsoft and the potty-mouthed Santabot.

Scunnerous wonders when IT folks will finally acknowledge that laptops are corporate security liabilities. Tuomoks says don't underestimate IBM when it comes to security efforts.

PacketCop wonders about network coding. MattR wonders why deploying a server takes so long.

Miles Baska re-tries the Carbonite backup service; explains why he still prefers rival Mozy. Dave cautions about multimedia files on a low-end NAS device.

Mitchell Ashley examines Microsoft's Volta effort to turn monolithic .Net apps into true client/server apps. Kerrie Meyler compares OpsMgr 2007 security and MOM 2005 security. Colin Spence compares the pros and cons of lists vs. document libraries.

Adam Gaffin wonders if enterprise bloggers and users are too sexy for one blogger. Paul McNamara rounds up criticism of a blogging council started by big software and media concerns. Tyson Kopczynski spends an evening on the Google Space Station.

James Gaskin cautions about free airport Wi-Fi. When it comes to wireless, think ROI, not cost, Craig Mathias says. Greg Royal writes that Amazon is setting a fire under mobile apps.

Google Gal asks: Is Google evil? Patrick Regan explains what it takes to get a good job.

From Microsoft Subnet: Hot discussions among Network World readers The top 5 coolest security features/products released this year by Cisco. Plus, Carbonite, Revisited; Open source software package takes aim at high-cost math programs; Microsoft pulls plug on potty-mouth Santa.

Review

Who's got the fastest firewall?
As a follow-up to Network World's previous rounds of baseline Unified Threat Management testing, we conducted a second high-speed test of only the firewalls shipping within the UTM boxes. These subsequent firewall tests showed that when pushed to speed over 2 Gbps, the top raw performers were Crossbeam and IBM but when cost is factored in, Juniper's lower end box and Watchguard's FireBox provide the best firewall price performance punch

How to

Ron Nutter helps a user roll his own NAS.

More news

Microsoft's network coding plan
An advanced technology called network coding is hidden away in the labs at some vendors as they figure out what to do with it. But Microsoft already has a working network coding prototype. Its Microsoft Secure Content Distribution (MSCD) system was trialed recently by customers to download a new release of Microsoft Visual Studio 2008 Beta-2.

A virtual hit for MLB Advanced Media
From pitch-by-pitch accounts of games to streaming audio and video -- plus news, schedules, statistics and more -- MLB Advanced Media has baseball covered. Strategic use of virtualization technology promises to smooth the company's shift to a new data center in Chicago in time for the 2008 season.

Gannett's virtualization veteran lets us pick his brains
To help it keep up with demand without breaking the bank, in 2002 Gannett Co. began exploring virtualization technology. Today the company has well over 1,000 virtual machines running on more than 50 VMware hosts.

Cisco spins out another corporate security architecture
Cisco unveils another security architecture, this one for role-based access.

IBM's security stance: underrated or overambitious?
IBM isn't known as a security company - even though it bought Internet Security Systems a year ago - but claims it's trying to become a dominant player in the network security market. Will Big Blue succeed?

Carriers mobilize for $24B in military telecom contracts
It's the high-tech spoils of war: The U.S. military plans to award telecommunications contracts worth as much as $24 billion, and the top-tier carriers are signing up to get a piece of the action.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY NOMINUM
rule

Live Webcast: DNS creator shares best practices
Join DNS inventor Paul Mockapetris for a Live Webcast 2 p.m. Eastern/11 a.m. Pacific, Tuesday, Jan. 15, and learn best practices for deploying a secure, resilient and high-performing DNS architecture. Learn how to check your DNS setup in order to support fast-growing mission-critical networks. Register today for this Live Webcast.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/10/07

TODAY'S MOST-READ STORIES:

  1. Microsoft pulls plug on potty-mouth Santa
  2. Open source software targets math programs
  3. Network coding: networking's next revolution?
  4. Cyberattack on national labs
  5. The nine worst Microsoft products
  6. Former Microsoft employee charged
  7. 2007 Cool Yule Tools gift guide
  8. Nortel thrashes Cisco wireless market share
  9. Cisco warns of bug in desktop software
  10. Vista's IPv6 raises new security concerns


TOP 100 OF 2007


Comprehensive Network Access Control

Download an exclusive whitepaper on Comprehensive Network Access Control and discover how you can provide endpoint security, compliance and peace of mind. Get it now



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Daily News PM Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: