Tuesday, August 11, 2009

Will Apple steal Windows 7 thunder?; Top 10 open source apps for Windows

From Microsoft Subnet; Top 10 open source apps for Windows
Network World logo

Microsoft Alert

NetworkWorld.com | Update Your Profile


Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center.

rule

Spotlight Story
Will Apple's multi-touch tablet steal Windows 7's multi-touch thunder?

Converging on Microsoft blogger Mitchell Ashley: Rumors about a possible (some say likely) Apple tablet are so intriguing because of Apple's huge success with the iPhone. Some are saying we'll see an Apple Tablet within four months. One of the more recent debates is whether the tablet would be a MacBook Touch (based on Mac OS X) or an iTouch on steroids (iPhone OS) and how this would affect Windows 7. Read full story

Related News:

From Microsoft Subnet
This is Network World's Microsoft Subnet news alert in which we focus on the top items from Microsoft Subnet, your daily source for Microsoft news, blogs, discussion items, security alerts, giveaways and more.

Top 10 open source apps for Windows
Every Windows user should consider making these utilities part of their standard applications.

DOJ - Back to Antitrust?
Kerrie Meyler: Regardless of how you felt about the US Department of Justice's (DOJ) actions against Microsoft ten years ago, the US DOJ did not bring a single antitrust case against a dominant company during the eight years of George W. Bush's administration.

How does one audit NTFS permissions without rights?
Tyson Kopczynski: A really good question recently came up on the SANS GIAC advisory board. Someone needed to audit the NTFS permissions on a set of files and directories and the admins had no rights to these objects.

First bits for SQL Server 2008 R2 are out
The Microsoft Subnet blog: In May, Microsoft promised that a community technology preview of SQL Server 2008 R2, formerly code-named Kilimanjaro, would be available in the second half of 2009. On Monday, that day has arrived.

Is Open Source The Enemy Within Chipping Away at Proprietary Microsoft?
Mitchell Ashley: Sam Ramji, VP of Strategic Platforms at Microsoft, said some pretty unexpected things during his interview on my podcast last week, especially about open source, hybrid and mixed stacks, and heterogeneity.

Patch Tuesday will fix critical flaws in Windows
The Microsoft Subnet blog: Microsoft has nine security bulletins planned - five of them critical. Nearly all of them center on Windows.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Systems Management: Best Practices that Save
Appliance-based systems management is easy to use, comprehensive and affordable and allows healthcare organizations to streamline and optimize systems management. Join us for this Live Webcast Wednesday, August 12 at 11:00 a.m. PST/2:00 p.m. EST. to learn how one network administrator at an acute-care hospital saved his team precious time and his organization money with an appliance-based approach to systems management.
Register now.


CCM for IT Compliance and Risk Management
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Click here to continue.

 

August 11, 2009

TOP STORIES | MOST DUGG STORIES

  1. 10 worst video game systems of all time
  2. Do HP, 3Com value claims trump Cisco?
  3. Cyber attackers empty business accounts in minutes
  4. Review: Cisco IPS 7.0 raises the bar
  5. Storage start-ups rethink data access
  6. Cisco's Chambers under fire
  7. Five ways to get affordable certification skills
  8. Nortel CEO Zafirovski steps down
  9. Patch Tuesday has a beating waiting for Windows
  10. IBM gets $16M to bolster brain-on-a-chip tech

Mergers & Acquisitions: The Data Dimension
More and more, mergers and acquisitions have become a key strategy for enterprise growth. To be successful, mergers and acquisitions rely on vast and complex processes from a data integration perspective. Using a real-life scenario this paper illustrates the challenges that enterprises face, and proposes a framework and best practices to enable smooth integration of acquired organizations.
Get your copy today.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

Anonymous said...

Can anyone recommend the best Remote Management & Monitoring system for a small IT service company like mine? Does anyone use Kaseya.com or GFI.com? How do they compare to these guys I found recently: N-able N-central desktop management
? What is your best take in cost vs performance among those three? I need a good advice please... Thanks in advance!