Tuesday, August 18, 2009

Essential Steps For Securing Hyper-V; Loopback adapter in Virtual Server 2005

From Microsoft Subnet; The Browser Ballot
Network World logo

Microsoft Alert

NetworkWorld.com | Update Your Profile


Sponsored by BigFix
rule

Go Green - Save Green - IT Power Management
Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.

Learn More

rule

Spotlight Story
Essential Steps For Securing Hyper-V

Mitchell Ashley: During this week's Converging on Microsoft podcast interview with Mike Schutz, Director of Product Management for the Microsoft Windows Server Division, we discuss the relevant steps necessary to secure servers running Hyper-V. Microsoft has a number of resources you will find helpful and Mike's interview is also a great place to learn what's happening with Hyper-V security. Read full story

Related News:

From Microsoft Subnet
This is Network World's Microsoft Subnet news alert in which we focus on the top items from Microsoft Subnet, your daily source for Microsoft news, blogs, discussion items, security alerts, giveaways and more.

The Browser Ballot
Kerrie Meyler: In response to the EU's concerns about Microsoft's bundling of Internet Explorer in Windows, Microsoft has offered to provide a "browser ballot" with the newest version of its operating system software.

Use the Loopback adapter in Virtual Server 2005
Brian Egler: Teaching Microsoft classes means using virtualization for education and testing. Nowadays we can set up a virtual cluster and test out a failover cluster using a rinky dink laptop. I discovered a neat feature with Virtual Server recently - the loopback adapter.

Microsoft pays for test that shows IE8 is most secure
Microsoft Subnet: In a test of Internet Explorer 8's malware-blocking abilities, IE8 significantly bested the competitors. But then again, Microsoft paid for the test.

Microsoft's unified modeling platform, Oslo, faces another overhaul
Microsoft Subnet: Microsoft altered course again with Oslo, by merging its Oslo team with its data programmability team. Here's hoping this change brings to fruition the long-promised "modeling tools for the masses."

Using RegEdit with WinRE
Glenn Weadock: Some of you may have had occasion to use the Windows Recovery Environment, or Windows RE, or WinRE – for example, when you have a Server 2008 machine that refuses to boot. I ran into just such a situation a week ago when I was installing a USB monitoring tool that totally locked up my system.

Grid Dynamics' Livschitz defies conventional wisdom to blaze a profitable trail
Alpa Agarwal: I spent an afternoon with Victoria Livschitz, CEO of Grid Dynamics and a chess master, at the offices of Mirantis, a company Grid Dynamics recently merged with. Livschitz, a confident, tell-it-like-it-is woman has studied mathematics, computer science, and electrical engineering, and has worked at Ford Motor Company and Sun Microsystems.

Microsoft/Nokia: Good Deal For SharePoint and Exchange
Mitchell Ashley: Reactions to the Microsoft / Nokia partnership are interesting and the hint of what is behind this deal is in the "collaboration and Office experiences" comments mentioned by Microsoft.

Windows Server 2008 R2 final release out
John Fontana: Microsoft released the final bits on Windows Server 2008 R2 to volume licensing customers nearly a week ahead of the time promised.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Mergers & Acquisitions: The Data Dimension
More and more, mergers and acquisitions have become a key strategy for enterprise growth. To be successful, mergers and acquisitions rely on vast and complex processes from a data integration perspective. Using a real-life scenario this paper illustrates the challenges that enterprises face, and proposes a framework and best practices to enable smooth integration of acquired organizations.
Learn more now.


Masters of Enterprise Storage
Visit this site to learn of newest storage advancements, issues and product announcements - issues such as Fibre Channel over Ethernet and whether vendors' plans for the technology make sense. The site includes a weekly blog, briefs on storage technologies and products, and links to stories on IDG's sites about storage.
Learn more.

 

August 18, 2009

TOP STORIES | MOST DUGG STORIES

  1. Apple disasters
  2. When Apple flops: The worst products of all time
  3. Microsoft IE 8 shines in Web browser security test
  4. The 10 most idiotic iPhone apps
  5. The 10 worst video game systems of all time
  6. Large broadband providers pass up stimulus funding
  7. 10 cool things you didn't know about Google
  8. Twitter used to manage botnet, says security expert
  9. Windows 7 RTM -- a closer look
  10. FAQ: How to get Windows 7 on the cheap

Alternative WLAN Infrastructures
A controller-based architecture requires that all frames be processed at the AP and the controller necessitating excessive hardware even in optimal configurations. Learn how a controller-free approach can provide the cost advantages of autonomous APs and the technical advantages of controller-based approaches.
Click here to learn more.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment