Tuesday, September 15, 2009

What the Avaya/Nortel deal means for Microsoft; The Trusted Platform Module

What is the Trusted Platform Module?; Number 1 Thing To Make Windows 7 Installs Easy
Network World logo

Microsoft Alert

NetworkWorld.com | Update Your Profile


Sponsored by Diskeeper
rule

Free Disk Performance Analyzer for Networks
Find disk-related performance bottlenecks on your networked systems now! Disk Performance Analyzer for Networks is a FREE utility that remotely scans your systems and identifies systems with severe disk performance issues—so you can address them before they become help desk calls. Download this free utility now!

Click here

rule

Spotlight Story
Avaya Buys Nortel. What does that mean for Microsoft?

Alex Lewis writes in his Microsoft Subnet blog, "After much hullabaloo, the actual Nortel auction was anti-climatic. Avaya was bid up by a bunch of other smaller players and ended up paying $900 million for Nortel's enterprise assets. Did they overpay? Maybe. But auctions are sometimes hard to let go of once you've made up your mind. Much has been made of the Microsoft-Nortel Innovative Communications Alliance (ICA). Nortel hasn't had any money to fund this initiative in months and while I used to hear of deals regularly, I haven't heard of any new ones in a while." Read full story

Related News:

What is the Trusted Platform Module?
Tyson Kopczynski: The term Trusted Platform Module is used to refer to both the name of a published specification by the Trusted Computing Group for a secure cryptoprocessor and the implementation of that specification in the form of a TPM chip. In Microsoft's BitLocker, a TPM chip is used to protect the encryption keys.

Number 1 Thing To Make Windows 7 Installs Easy
Mitchell Ashley: I hate to think how many times I've installed some version of Windows 7 since its debut back at Microsoft PDC 2008. There was the Windows 7 pre-public beta, the Windows 7 public beta, the Windows 7 RC and the Windows 7 RTM. On my daily use laptop alone I've installed each of these Windows 7 versions, some more than twice."

Keys to Creating Successful Global Teams
Susan Hanley: In early September, Knowledge@Wharton published an article about creating successful global teams that anyone using SharePoint for team collaboration should read.

LavaBlast Software uses SQL Server and open source SubSonic
Alpa Agarwal: LavaBlast develops custom software for the franchise industry, spanning self-serve interactive kiosks, point-of-sale systems, and e-commerce sites. LavaBlast runs on Microsoft SQL Server for which the Microsoft C# data access layer is auto-generated by the SubSonic open source project.

When to Use Public Folders in Exchange 2010
Alex Lewis: When I visit a new client to talk Exchange 2010, or even Exchange 2007, the topic of public folders inevitably comes up. Sometimes they can be replaced with SharePoint, but, alas, other times, they can't.

Attend a conference on virtualization...Virtually
Ron Barrett: With all the talk we do about virtualization and how efficient and cost effective it is for organizations, I guess it makes sense to have a virtual conference. IT Virtualization Live is an online conference that will be presented Tuesday Sept. 15th at 11am ET.

Podcast: Are you doing what it takes to succeed at implementing SharePoint?
Mitchell Ashley: I talked with Dux Raymond Sy, author of O'Reilly's SharePoint for Project Management and Innovative-E SharePoint consultant, on this week's podcast about what we can learn from successful and failed SharePoint projects.

Google's email outage and the fallacy of 3 nine's
Kerrie Meyler: On September 1, Google's web-based email went offline. This follows another outage in May. There were previous outages earlier in May, one in mid-April, and another in March. What does this mean?

Small Business Server 2008: Turning 'OFF' IPv6 could be dangerous
Ron Barrett: So yesterday I went with a good friend of mine to the city to help him with an issue with Windows Small Business Server (SBS) 2008. Some readers out there may have already experienced the Windows SBS 2008 IPv6 dilemma and you know what I am talking about. For those of you who have not let me give a little background.

Seven Required Topics to Study for Virtualization Certification
Bryan Sullins: I recently acquired the VCP Certification. Although that certification is centered, of course, on VMware, I would like to talk more specifically about virtualization technologies that all the major vendors (Microsoft, VMware, and XenServer) have in common.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Win a 32"LCD at on Sept. 29th
Security Directions: A Virtual Conference Presented by - CIO, Computerworld, CSO, InfoWorld & Network World. Join us for "Protecting Your Enterprise in a Dynamic Infrastructure" - a unique online security event. Listen to CSO publisher, Bob Bragdon and a panel of experts and users, to hear about real-world security deployments. And just for attending, you'll have a chance to win a flat screen LCD TV.
Register Now!


 

September 15, 2009

TOP STORIES | MOST DUGG STORIES

  1. IEEE stamps "approved" on 802.11n Wi-Fi standard
  2. Sprint CEO calls the iPhone the "Michael Jordan" of smartphones
  3. Developer denies software to beat Chinese censors is malicious
  4. 10 cool Web apps developed in two days
  5. Top 10 cool satellite projects
  6. 11n Wi-Fi chip discovered in new iPod Touch
  7. 802.11n pioneer sets 'wicked fast' expectations for wireless
  8. Five end game scenarios - How the Internet will die
  9. Microsoft: In-place Windows 7 upgrades can take up to 20 hours
  10. Linux driver chief calls out Microsoft over code submission

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal.
Learn More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: