Channel Marker


April 2, 2007  10:37 AM

Xerox acquires Global, imaging and doc management services company

Brein Matturro Profile: Brein Matturro

Xerox Corp. has announced its intention to buy document-management and print-services provider Global Imaging Systems for about $1.5 billion in cash.

Global Imaging is a Tampa, Fla.-based company that focuses on the small- and medium-sized business (SMB) market through 21 regional subsidiaries and employs 4,500 people.

Global’s president and chief operating offer will continue with the company, reporting to Jim Firestone, president of Xerox North America.

Global carries products from Ricoh, Konica Minolta and Sharp, but does not currently carry Xerox. After the acquisition closed in May, Global will operate as a subsidiary of Xerox and will gradually add Xerox’ lines as well.

April 2, 2007  9:40 AM

Microsoft, Tape Backup doing nicely, thank you

BKraemer Brian Kraemer Profile: BKraemer

Lots of interesting Microsoft Vista news coming out today. The first article I came across talks about the problems with virtualizing Vista. Apparently, it isn’t going to be that easy. The article goes on to claim that Vista Enterprise Centralized Desktop (VECD) will be a costly endeavor. In addition to the additional fees that SMBs will have to pay, there are “technical limitations and massive IT resources” that will be required. The company seems to think that it will end up being nothing more than a niche solution. Apparently, Microsoft hasn’t been keeping up on the virtualization buzz that the channel has been seeing. Granted, VECD only seems to apply to desktop workstations, but server virtualization has been gaining enough steam that there will be a legitimate need for it in the future.

In security news, it looks as if the government will be upgrading to Vista by February 1st 2008. The goal of the upgrade being to standardize government workstations and provide a uniform level of security for the body that runs the country. Channel professionals specializing in Vista should be licking their chops in anticipation of the fat government training and support contracts that will soon be featured at a pork barrel near you.

Finally, are you or your client anti-disk storage? Been waiting for a technology to mature a little bit and gain some traction? In February Big Blue launched what it claims to be the first “tape library with enterprise-class encryption for SMBs and remote corporate offices.” Instead of dealing with pesky, quick data retrieval, SMBs can still rely on tape backup to keep their important data stored. Not bad for a channel partner who wouldn’t mind selling that hardware, creating a service plan and storing the data.

Just a thought.

-Brian


April 2, 2007  6:28 AM

Channel news: IE7 download is spam; Calif. wastes $1.4B onIT; Symantec Backup Vista-rified

BKraemer Brein Matturro Profile: Brein Matturro

Spam poses as Internet Explorer 7 download  Beware of emails from “admin@microsoft.com.” It may look like an invitation to download Internet Explorer 7, but it’s really a trick to infect machines with malware. [SearchSecurity.com]

California’s $1.4bn IT boondoggle More dollars than sense. [TheReg]

Symantec Backup Exec gets Vista-tized Fresh release Exchanged and x64ed too. [TheReg]

Cisco develops smart network bot Network connection drops and these little guys pick it right back up again. [DailyTech]

Continued »


March 30, 2007  2:32 PM

Are Business Process Management solutions the way of the future? Forrester Research says, yes!

BKraemer Brein Matturro Profile: Brein Matturro

In a recent interview about Business Process Management Solution (BPMS) channel opportunities, industry expert AndreTruong said that BPMS hasn’t hit the mainstream yet but presents fruitful future possibilities.

A  recent study on BPM from Forrester Research echoes Truong’s opinion and praises BPMS as a tool which provides the agility required for success in today’s business processes.

According to the report, Forrester defines digital business architecture: as “an IT architecture centered on business metadata on which IT solutions act in a unified and consistent way to deliver rapid business change.” The report then lays out two core requirements for the technology supporting digital business architecture:

  1. Business policies must be constructed in such a metadata friendly way, which will make it easy for it to be electronically stored, accessed and manipulated.
  2. The metadata must work consistently across heterogeneous environments.

The report touts BPMS solutions as creating a “major paradigm shift” by capturing business models “…inside the BPMS solution in an executable format, providing direct alignment between business design, technology implementation and business measurements.” Furthermore, BPMS’s graphical process model makes it easy to change processes.

The following bullet points are a boiled down version of Forrester’s findings:

BPMS allows standards-based, model-driven, design, development and execution:

  • Captures business process flows
  • Supports model-driven development
  • Enables process orchestration
  • Stores service definition
  • Provides SOA infrastructure

BPMS features add value:

  • Captures business metadata beyond process models
  • Stores business metadata
  • Provides real-time user visibility into business process

BPMS features support digital business architecture including:

BPMS puts the business in digital business architecture:

  • Increased business collaboration in process modeling
  • Enhanced communication between business units and BTs.
  • Alignment of business process role-models
  • Allows flexible adjustment of business rules
  • Improved focus on business process ownership

Are you a BPMS consultant, or are you interested in becoming one? Are you a business-owner with BPMS experiences? If so, we would love to hear from you.


March 30, 2007  7:23 AM

Channel news: Dell financial ‘misconduct;’ details on TJX errors

BKraemer Brein Matturro Profile: Brein Matturro

Dell reports it has found financial‘misconduct’ Dell said “evidence of misconduct” had been uncovered in an internal investigation of its financial practices over several years. [NYT]

What happened in TJX security failings? If company execs need a lesson on what not to do before and after a data breach, experts say there’s plenty to learn from a regulatory document TJX filed with the SEC Wednesday.
[SearchSecurity.com]

Will data breach be the end of TJX? This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example?[SearchSecurity.com]

PC Makers: Vista brings little joy so far  After all the hype surrounding its January launch, Microsoft’s new
Vista operating system has yet to brighten the outlook for PC makers and could even lead to oversupplies for those who had built up inventory. [ChannelWeb]

Continued »


March 29, 2007  3:38 PM

How d’you like ‘dem apples?

BKraemer Brein Matturro Profile: Brein Matturro

It may not matter, if the apples are going out of season. Phone numbers’ days may be limited with the growing popularity of VoIP. Contrary to the traditional practice of telecommunications companies charging users a fee for their phone number, session initiation protocol (SIP), which handles most online calls, doesn’t need the traditional ten digit number (or even the 1, if dialing out of area) to know who you want to talk to.

It’s kind of a “duh” concept, but only recently has someone put a plan in motion to bypass this “ancient” tradition in telecom. John Todd, of TalkPlus, helped create Freenum, an organization partnered with over 200 universities looking to adopt this idea into their own communications systems. The implications for further savings that this sort of “numberless” system might offer businesses are clear. However, it will be up to SIs and VARs to look at what Freenum is doing and adopt it to the channel.

In other VoIP news, industry giant Vonage is facing financial troubles in the face of a patent infringement ruling and negative reports from Wall Street analysts.

According to a report in the Boston Globe, Vonage is the “worst-performing US initial public offering in the past year” and may be facing bankruptcy in the next few years.

Wall Street analysts have given the company low marks after a Virginia court ordered Vonage to pay Verizon $58 million for patent infringement; saying that the result could threaten the embattled company’s profitability.

Finally, a lot of people are talking about the current dispute between Oracle and one of their competitors. Alls I know is, tomorrow is Friday, so I wish it were TomorrowNow….

~Eric Pierce


March 29, 2007  12:01 PM

Is Oracle having done unto it what it done unto Red Hat?

BKraemer Yuval Shavit Profile: YuvalShavit

Without any more fanfare than is given to any standard press release, Oracle reported yesterday on some of its users’ experience with Unbreakable Linux. Given that Oracle sued SAP for “corporate theft on a grand scale” last week, it’s interesting to note some similarities — and some differences.

Oracle – SAP Red Hat – Oracle
Who took from whom? SAP’s subsidiary TomorrowNow took from Oracle, according to the suit Oracle took from Red Hat, according to Oracle
What’d they take? Support materials An OS and publicly available support materials
Was it allowed? No, says Oracle. Maybe, says an analyst. Yes — open source
End result? Support for Oracle at half the cost Support for Red Hat at half the cost
Why’d they do it? To undercut a competitor To undercut a competitor
Reaction? A lawsuit No lawsuit

Of course, open source is open source, and proprietary information is proprietary. And Oracle may get a court to agree that when TomorrowNow allegedly downloaded support information for one client and used the same information to support others it was “stealing software products and other confidential materials that Oracle developed to service its own support customers.” Or the court could decide that proprietary information — once legitimately paid for by a customer and used by a VAR to support that customer — can be used for other purposes with no further obligation to the original owner. And that’s assuming the case even makes it to court — Oracle and SAP could settle, instead.
IP arguments are complicated, and VARs involved in this kind of support could be culpable to the vendor who supplied the software and the documentation. So the difference between open and closed is no joke.

But it’s interesting to note the parallels, nevertheless.

-Yuval Shavit


March 29, 2007  11:55 AM

Oracle’s Claims Against SAP, TomorrowNow, could have a chilling effect on some channel support

BKraemer Brein Matturro Profile: Brein Matturro

If you haven’t been paying attention to Oracle’s lawsuit against SAP subsidiary TomorrowNow,  then you may want to start. If you’re in the business of providing after-market support for packaged applications, or migrating customers from one package to another,  then how this suit plays out may have a direct effect on you.

Oracle is suing over alleged misuse of customers’ support licenses for PeopleSoft applications. TomorrowNow, a company started by ex-PeopleSoft execs, is in the business of getting clients off PeopleSoft and onto SAP’s applications; allegedly, TomorrowNow employees accessed support data from Oracle improperly to provide support for Oracle applications—and passing technical data along to other partners.

If Oracle is successful in this legal gambit, it could make life interesting for SIs and VARs who provide their own, discounted training and support to clients for packaged applications like Oracle’s, or other technology. If you provide technical assistance to a customer as part of a migration or upgrade, or offer alternatives to the support and training provided by suppliers, are you opening yourself up to the kinds of claims Oracle is making?

–Sean Gallagher


March 29, 2007  7:15 AM

Channel news: FBI net at risk; CIOs like jobs, not outsourcers; Cisco UC security risks

BKraemer Brein Matturro Profile: Brein Matturro

FBI wireless network at risk A report into the US Department of Justice’s wireless network project says that after six years and $195 million it is falling to bits. [Inquirer]

Survey: CIOs like their jobs, not their outsourcers With their salaries and budgets on the rise, a majority of CIOs speak highly of their jobs in a new survey. Yet they have mostly harsh words for their outsourcing relationships. [eWEEK]

Multiple Cisco Unified CallManager and Presence Server denial of service vulnerabilities  Cisco Unified CallManager (CUCM) and Cisco Unified Presence Server (CUPS) contain multiple vulnerabilities which may result in the failure of CUCM or CUPS functionality, resulting in a Denial of Service (DoS) condition. There are no workarounds for these vulnerabilities. Cisco has made free software available to address these vulnerabilities for affected customers. [Cisco]

Webroot study finds 43% of firms hit with malware The security vendor’s State of
Internet Security report surveys 600 companies on their experiences with malware threats. [eWEEK]

Continued »


March 28, 2007  3:08 PM

Attack scripts available for IE flaw

BKraemer Brein Matturro Profile: Brein Matturro

Full exploit code” has been published that would let attackers cut-and-paste their way to an effective assault on Internet Explorer installs, according to a report Monday from Websense Security Labs.

Microsoft reported Feb. 13 that the flaw – known since February to affect the ADODB.Connection ActiveX control in the Microsoft Data Access Components  – would allow attackers to hijack targeted machines.

Security services providers and IT administrators who have not yet updated their IE installations can download the patch from Microsoft.

The flaw was discovered last July by Metasploit Framework creator H.D. Moore. Separatelym Moore announced Tuesday that version 3.0 of his popular penetration testing tool is now available.

The original version of this story appeared on TechTarget sister site SearchSecurity.com.

     —Kevin Fogarty


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: