Wednesday, November 09, 2011

Godfather of Xen: Virtualization holds key to future of enterprise secruity

Open source vs. proprietary software | IBM open sources messaging client for embedded devices

Network World Linux and Open Source

Forward this to a Friend >>>


Godfather of Xen: Virtualization holds key to future of enterprise secruity
While conventional wisdom says virtualized environments and public clouds create massive security headaches, the godfather of Xen, the open source hypervisor, says virtualization actually holds a key to better security. Read More


WHITE PAPER: Oracle

Justifying Investments in Database Security
Aberdeen's analysis shows clear-cut advantages for database security rather than application-level security requiring encryption of data: based on the same number of applications, 30% fewer incidents of data loss or data exposure, and 15% greater efficiency at addressing common audit requirements. Read More Now!

WHITE PAPER: AMD

The Accelerated SMB: Moving at the Speed of Virtualization
Mid-market corporations increasingly rely on technology to serve as the enablers and accelerators of the business—not just to reduce costs but also to empower new business initiatives and increase the top line. Learn More!

Open source vs. proprietary software
The "scrufffy guy coding away in his basement" archetype stopped applying to open-source software a while ago. Read More

IBM open sources messaging client for embedded devices
In a move to bring network connectivity to a wider range of devices, sensors and appliances, IBM has donated the source code of its machine-to-machine messaging software to the Eclipse Foundation, the company announced Thursday. Read More


WHITE PAPER: Dell

Mobile Technology: The Productivity Edge
IT must devise a workable balance by ensuring security of mobile data without squashing worker productivity. This Mobility KnowledgeVault will walk you through four key factors to build a workable plan and highlights real-world examples of businesses that are succeeding at fulfilling the productivity promise of mobility. View now

Oracle reveals open source JavaFX plans
The company seeks transparency and an open development model in addition to the replacement of any closed code with open code. Read More

Verne Unveiled: Fedora 16 Released
In her email announcing the release of Fedora 16, codenamed "Verne", Bergeron adds a touching tribute to Dennis Ritchie, "A humble man, not well-known outside his field, Dennis will always be remembered by those of us who practice the craft. Thank you, Dennis." Read More


WHITE PAPER: BMC

Six Advantages of a Cloud-Based Help Desk
Small and midsize companies shouldn't have to use less efficient, limited-functionality service desk solutions. Today's cloud-based help desks pack the same punch as on-premise enterprise solutions, without a large up-front investment or long installation time. Read more to find out how to get started with a cloud-based help desk today. Read More Today!

Google Releases sfntly Font Programming Language as Open Source
"Created by the Google Internationalization Engineering team, the sfntly Java and C++ library makes it easy for programmers to build high performance font manipulation applications and services," he wrote. Read More

Canonical's Ubuntu Linux will battle for mobile developers
The company will need traction with hardware vendors before it gets it from developers. Read More

Open-source proponents blast proprietary software in Dutch schools
Dutch education authorities have decided to throw out their government's own open standards policy and instead lock-in to Microsoft proprietary software for years to come, according to open source advocates. Read More

SchoonerSQL - MySQL On Steroids
While MySQL has been an unqualified success, there have always been whispers and regrets from those looking to use the open source database in mission critical situations. If you need five 9's type of availability and other large enterprise features, MySQL may not have been able to scale up for you. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Juniper at the root of Internet outage?
  2. Tech argument: Tablets vs. laptops vs. smartphones
  3. Nook Tablet vs. Kindle Fire: Which will win?
  4. Will Windows 8 really perform well on low-end hardware?
  5. Wi-Fi security do's and don'ts
  6. Gartner: 10 key IT trends for 2012
  7. Fabric wars: Cisco vs. Brocade vs. Juniper
  8. How Hotmail will wage war on newsletters
  9. Major Internet outage only briefly delays griping via social media
  10. How IBM started grading its developers' productivity

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: