Court backs FCC over states in VoIP case A federal appeals court on Wednesday upheld a decision by the Federal Communications Commission that barred states, including Minnesota, from regulating Internet-based phone services. [AP]
Gartner: Look for little change in worldwide PC shipment, revenue Worldwide PC shipments are forecast to total 255.7 million units in 2007, a 10.5% increase from 2006, while PC revenue is projected to reach $213.7 billion, a 4.6% increase, according to the latest forecast by Gartner. [Teknorati]
IDC Report: Virtualization Cannibalizes Server Sales IDC’s new report indicates that multicore and virtualization will cost the x86 market more than 4.5 million shipments and $2.4 billion in customer spending between 2006 and 2010. Overall, x86 shipments that were once projected to increase 61% by 2010 are now facing just 39% growth during that same period. [NewsFactor Network]
Palm purchased by Friday? Nokia, Moto among potential owners, it’s said. [TheReg]
Alaska and Dell team on $38bn bungle When storage specialists attack. [TheReg]
Explaining a Vista ban The National Institute of Standards and Technology has put a moratorium on using Windows Vista, but that’s business as usual, says agency’s CIO. [CNET]
Microsoft continues to fine-tune Vista licensing Microsoft is offering users who purchase one Vista license — full or upgrade, purchased either at retail or via a PC-preload deal — the right to buy multiple additional copies at 10% off retail price per copy. At its heart, the promo is just as much, if not more, about fighting piracy as it is about spurring
Vista sales. [AllAboutMicrosoft]
Measuring Vista’s true security muscle will take time Researchers are digging through the Windows Vista code right now, and when they find flaws we’ll hear about it. But it’s the ones we don’t hear about that should keep us up at night. [SearchSecurity.com]
Symantec says fixing licensing portal top priority Company officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November.[SearchStorage.com]
T.J. Maxx parent company sued in credit card hack probe Major shareholder files lawsuit seeking documents related to an incident that left customer information vulnerable. [CNET]
Sun hires top Linux developer to market Solaris Sun Microsystems Inc. has hired one of the best known developers of Linux software to market its Solaris operating system as it seeks to improve ties to the open-source community. [Reuters]
Apple makes biggest move yet into living rooms Apple Inc. made its biggest move yet into the living room on Wednesday by starting shipments of the Apple TV box, a gizmo that lets people take music, photos and video stored on a computer and play them on a television screen. [Reuters]
SOA specs SCA and SDO headed for OASIS and the JCP The Open SOA group has finally found a standards body homes for its two key specifications, Service Component Architecture (SCA) and Service Data Objects (SDO) at OASIS and JCP.[SearchWebServices.com]
The size of a paperback and most of the functions of a real PC Hoping to put a PC in every purse, Samsung has upgraded its Q1 line of tiny 1.7-pound portable computers. [NYT]
Windows applications in Ubuntu with a seamless desktop A step by step tutorial on how to set up Windows applications to work seamlessly with the new Ubuntu 7.04 Feisty Fawn. [Ubuntu.com via Digg]
Remember SneakerNet? Think it’s gone? Except for that once-in-a-while you have to use it because the bandwidth is too small or two machines won’t talk to each other?
According to a Wired story, Google has decided it’s faster to drive data from one place to another if the volume of data is high enough.
In this case it’s 120TB – nearly all the astronomical data collected by the Hubble Space Telescope. A Google program manager named Chris DiBona (whose pic makes him look like Penn Jillette in pirate drag) is overseeing an informal arrangement in which Google acts as data repository and distributor for scientists with really large chunks of data to move.
Rather than spend a month loading data into packets and sending it over the network, the Google crew is loading the data onto cheap-PC hard drives and FedExing them between the Hubble Telescope crew and its own facilities. It only takes about a day to load up the data, and FedEx delivers overnight.
It will use the same procedure to send copies of the data to other scientists, or to collect and distribute data from other scientists.
That’s a long way from sending an intern across the office with a floppy disk. But every technology has to be updated to accommodate modern requirements. Even SneakerNet.
Novell identity management marries event monitoring At its annual BrainShare conference, Novell announced it would combine its Identity Manager 3.5 application with the company’s existing network monitoring and login tools. [SearchEnterpriseLinux.com]
Server buyers shift toward muscle machines Average server prices actually increased in the fourth quarter, marking a purchasing shift toward beefier machines that handle more work. [CNET]
Virtualization and multicore innovations disrupting the worldwide server market IDC says the rapid emergence of multicore architectures and virtualization technologies is significantly restricting worldwide x86 server shipments. According to IDC’s updated forecast, multicore and virtualization will cost the x86 market more than 4.5 million shipments and $2.4 billion in customer spending between 2006 and 2010. [Tekrati]
Oracle says profit rose 35% to exceed expectations Lawrence J. Ellison’s three-year buying spree as chief executive of Oracle appears to be paying off. [NYT]
The buzz on the street after Boston’s SecureWorld conference is all about collaboration.
One expert in particular renewed the call for IT departments to collaborate with physical security. It isn’t enough to secure your network from back door attacks if people can get in through the back door of the building and plug in.
Ray Bernard of Ray Bernard Consulting Services told his audience about one customer who gave sniffers to the security guards so that they could locate rogue access points while they were on their routine walks around the building.
As a value-added reseller (VAR) or consultant, you can make yourself indispensible if you take on the responsibility of facilitating conversation between different departments at your customer’s company, so grab the bull by the horns and forge in.
Ellen Metcalf, author and thinker, knew what she was talking about when she said: “You have to recognize when the right place and the right time fuse and take advantage of that opportunity. There are plenty of opportunities out there. You can’t sit back and wait.”
Start by assessing your customer’s site, then be a negotiator. Don’t be afraid of making an unpopular suggestion. Your customers will thank you for it, and hire you again and again.
- Julia Henderson
Computer error rocks Alaska’s fund Perhaps you know that sinking feeling when a single keystroke accidentally destroy hours of work. Now imagine wiping out a disc drive containing an account worth $38 billion. [AP]
Outlaw biker gangs have set up their own IT departments Organized crime groups, including outlaw biker gangs, have set up their own highly sophisticated IT departments for debit skimming and credit fraud operations. The IT expertise among organized criminal gangs is on par with legitimate business. [Calgary Sun via Digg]
IBM, Cisco partner on emergency services offering Companies’ new managed service is designed to serve government and corporate customers as a one-stop shop. [CNET]
Red Hat and Intel channels beat as one Red Hat is fast-tracking reseller accreditation to anyone with an Intel Premier or Associate badge. It’s free of charge too and it means that system builders don’t have to spend months to qualify for Red Hat approval. Before today, Red Hat would request a fee from any builder who wanted certifying. [TheReg]
The United States is still number one source of online attacks in the world, CNET reports.
Take that China!
The report goes on to say that 31% of all malicious online attacks originate within the United States, with an even higher percentage of credit card fraud originating with Old Glory and Uncle Sam as well. Those stats make me wonder what kind of damage is being to SMBs that the channel might be able to repair. It seems like it must be a matter of storage security being violated and private information is getting stolen by, what I like to call, malcontents. But where does the blame really lie? With the person who can hack into a private network and steal that information? Or does it lie with the company that isn’t keeping that information secure?
It isn’t the first time in the last 12 months that something like this has happened. So how should the problem get fixed? VARs, start your engines. By proposing a complete storage security program, VARs can provide a badly needed service. Check back on SearchStorageChannel.com tomorrow for our comprehensive Project Guide on Storage Security and start providing the services that most companies don’t realize they need.
Hacker techniques use Google to unearth sensitive data Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns. [SearchSecurity.com]
Symantec concerned over Vista tunneling protocol Updated: Security company Symantec says new research supports fears that
Vista’s use of the IP tunneling protocol Teredo is potentially insecure. [eWEEK]
Researchers track down a plague of fake Web pages Microsoft researchers say they have traced the companies and techniques behind thousands of spam Web pages. [NYT]
Windows Vista is less secure than XP: Kaspersky Security company Kaspersky has said that Windows Vista’s User Account Control (UAC), the system of user privileges that can be used to restrict users’ administrative rights, will be so annoying that users will disable it. “There’s a question mark if Vista security has improved, or has really dropped down,” said Kaspersky’s chief executive. [ZDNet]
If you work with blades and are curious about virtualizing blades servers, this year’s Server Blade Summit is called Blades & Virtualization: The Perfect Marriage. It runs from May1-3, in Anaheim, Calif.
In a recent soon-to-be published interview, the summit chair and author of the book Blades Server and Virtualization, Barb Goldworm, touted the benefits of this marriage. According to Goldworm, the low-power, overheated blade server is a thing of the past. The blades technology which has evolved over the past five years has produced the space-saving, power-efficient server of the future, and it’s partnership with virtualization offers new storage options, high availability and user-friendly management tools.
I thought it might be worthwhile to consult the blogosphere and this is what I found: An unsigned blog titled, HP reduces customer administrative costs and wait time with blade network virtualization technologies, on WindowsNetworking.com, echoes Goldworm; it sings praises for Hewlett Packard’s, ProLiant xw460c Blade Workstation. According to this blogger, HP’s blade/virtualization marriage, “Dramatically simplifies network connectivity and server management tasks.”
“When I say sacrifice,” Manca writes, “I mean that hypervisors will never perform the same as native systems. They will have lower security… and they will add complexity from a management perspective. However, in many cases, these are trade offs worth making for some customers.”
Is the tradeoff worth it for you and your customers? Is server management simplified or complicated by this partnership? What is your blades/virtualization server experience? Let us know.
Cisco buys WebEx for $3.2 billion Cisco today announced plans to buy WebEx, maker of hosted, on-demand collaboration applications. [SearchNetworking.com]
RSA takes on Trojan horses Service will help financial institutions identify Trojan horses and take down the Web sites that distribute the threats. [CNET]
Microsoft investigates IE 7 vulnerability The vulnerability leaves users open to potential phishing attacks.
Voice over IP is one of the biggest drivers for new network channel business today, and it isn’t slowing down yet. VoIP services are expected to generate over $6 billion in revenue in North America this year, and are projected to grow to $13.3 billion by 2009, according to data from Infonetics Research .
But that doesn’t mean it’s easy money. Kenny Frerichs, president and CEO of application performance management tool vendor Network Physics, says that about of 70% of VoIP implementations are “problematic”. Misconfigured networks, contention for bandwidth from other applications, and security issues all can potentially make a VoIP project into a money pit—and put serious strains on your relationship with your client.
This week, we’ve pulled together a project guide for VoIP implementation, including tips on planning a VoIP network, migrating from traditional PBX phone systems to VoIP, and ensuring VoIP security.
Speaking of security, if you’ve been tracking the data security woes of companies like TJX, you’ll understand why data-in-transit security is getting a little more attention these days. Contributor Greg Schulz provides some tips on securing data in transit; we’ve also pulled together some related material on the new generation of storage security offerings that can help keep your clients from being the next TJX.