Channel Marker

April 13, 2007  1:18 PM

Green technology trends: IT fights against Global Warming

Brein Matturro Profile: Brein Matturro

Certain politicos may not take Global Warming seriously, but the IT industry certainly does.

Last April, our sister site reported that IT heavyweights IBM, Hewlitt-Packard and Sun Microsystems sponsored a “new initiative called the Green Grid” who were to focus on data center power management and cooling.

The non-profit environmental consortium was launched early this year. Last week I posted a boiled down version of Green Grid’s energy saving guidelines. On April 10th they announced their inaugural technical summit, to be held April 18-19 in Denver Colo. The release also welcomed Brocade Communications, Cisco and Novell; these industry giants join Hewlett-Packard, IBM, Microsoft, Sun Microsystems, VMware and Dell. recently posted Dell pushes green computing initiative; the company is introducing two low power AMD Opteron-based servers, PowerEdge 2970 and PowerEdge Energy Smart 2970D. Dell claims that these servers draw up to 34% less power than a Dell Power Edge and can deliver up to 105% greater performance per watt over the previous generation of Dell servers featuring dual-core processors.

Are we seeing an environmental trend in the IT industry? It looks that way to me, given whose involved. What do you think?

Esther Friedman

April 13, 2007  11:51 AM

Cyberoam appliance offers identity based UTM

Bcournoyer Brendan Cournoyer Profile: Bcournoyer

Security vendor Cyberoam is expanding its channel program to sell its new unified threat management (UTM) appliance.

Cyberoam calls the appliance the first identity-based UTM on the market, meaning it controls access based on information in access-control lists about the user — not on the machine being used to connect to the network.

The vendor has enlisted the help of a marketing firm, Marketlink Technologies, and formed a channel partner advisory board to attract more value-added resellers (VARs) to the 100%-channel-driven initiative.

One of the first VARs to sign on was Creative Breakthroughs of Troy, Mich. Steve Barone, the reseller’s president, expects small- to medium-sized businesses (SMBs) and the remote offices of enterprise companies to make up the vast majority of buyers.

Cyberoam has a window of opportunity of about six months to sell the identity-based UTM before market leaders like Fortinet and Juniper Networks come up with similar solutions, Barone said. Cyberoam is targeting the top 4% of VARs for its channel program, said David Glenn, the director of U.S. channel sales.

“We’re really looking for people that either have a hole in their existing product set or are really focused on security,” he said.

Colin Steele

April 13, 2007  7:03 AM

Channel news: Major malware outbreak; Cisco WLAN gear shows flaws

Brein Matturro Profile: Brein Matturro

Malware outbreak ‘largest in almost a year’ Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.

Cisco wireless products suffer multiple vulnerabilities Cisco Systems is reporting multiple vulnerabilities in Cisco’s Wireless Control System (WCS), Wireless LAN Controller and Lightweight Access Points. [TheReg]

Microsoft delays betas for virtualization software Beta releases for Microsoft’s Viridian hypervisor and Virtual Server 2005 Service Pack have been pushed back. Analysts say ship dates and third-party vendors could be affected too. []

Continued »

April 12, 2007  7:14 AM

Channel news: New IT service-managment rival debuts; Exchange service pack ready to go

Brein Matturro Profile: Brein Matturro

Indicative takes on big 4 in IT service management The company challenges much larger rivals like IBM and HP with its Indicative performance monitoring and troubleshooting tool. [eWEEK]

Exchange Server 2007 Service Pack 1 beta ready for download Microsoft has begun rolling out the first beta of Service Pack (SP) 1 for Exchange Server 2007, according to a blog posting on Microsoft’s TechNet site. Exchange Server 2007 shipped just over four months ago, in December 2006. [All About Microsoft]

Dell pushes green computing initiative, offers low power AMD servers Dell is offering two new lower power PowerEdge servers using AMD Opteron processors to address power consumption concerns in the data center.[]

The incredible shrinking SOA vendors Acquisition mania is likely to continue to shorten the list of SOA software vendors, analysts say, but it may not be bad news even for organizations shopping for platforms and tools.[]

Application maintenance colossal pain point for SMBs Forrester Research found that SMBs tend to apply “Band-Aids” rather than fix problems when their application maintenance groups start to falter.[]

IBM connects chips for better bandwidth Intel and others have been showing off “through-silicon vias,” but IBM says it will come out with chips using the new technology next year. [CNET]

 20%  of mobiles to include Near Field Communications by 2012 By 2012, some 292 million handsets — just over 20% of the global mobile handset market — will ship with built in NFC capabilities, according to ABI Research. The analysts believe this year will be critical for NFC technology as key standards and operator trials complete the foundations for the first real deployments. [Tekrati]

Stanford report: what do users do on the Internet? We asked each of our 4000 respondents to select among a list of 17 common internet activities and tell us which they did or did not do. This is what we found.

LeftHand takes iSCSI to 10Gig Slapping SAN and the LAN together. [TheReg]

Apache reignites Sun open source dispute Opens fire with open letter. [TheReg]

April 11, 2007  6:11 AM

Channel news: Weak Vista launch drags down IT business; Microsoft struggles with patches

Brein Matturro Profile: Brein Matturro

Weak Vista launch continues to take its toll on computer industry The release of Vista was supposed to have been a boon for the computer industry, as many were expecting business and consumers to upgrade their hardware at the same time they upgraded their operating system. But, despite Microsoft’s claims to the contrary, the launch has generally been regarded as weak. The upshot is that makers of computers and parts are now being forced to ratchet down expectations. [Techdirt]

Not a good day for Microsoft Microsoft issued yet another critical security update for Windows Vista its most secure version of Windows ever, as part of the company’s Patch Tuesday set of updates. Meanwhile, Goldman Sachs — the Wall Street firm that helped take Microsoft public — issued a note removing Microsoft from its “super-duper buy list,” claiming Microsoft is at a crossroads. [All About Microsoft]

Oracle to patch 37 flaws Database giant Oracle Corp. offered a preview of its April Critical Patch Update (CPU). Fixes are planned for 37 flaws across its product line.

Symantec patches flaw in Enterprise Security Manager Anti-virus vendor plugs hole that could have been exploited remotely. [eWEEK]

Continued »

April 10, 2007  10:23 AM

Out, out [darn] rootkit!

Brein Matturro Profile: Brein Matturro

Antivirus, firewall protection and security solution provider GRISOFT announced a new free tool for rootkit removal this morning. As the press release says:

“Rootkits are computer code that attempt to hide their actions and processes, making the job of detecting the code and the harmful processes very difficult,” explains Larry Bridwell, VP of Global Security Strategies of GRISOFT. “AVG Anti-Rootkit is developed to detect and destroy rootkits effectively, without bothering users with false alarms.”

The product’s web page boasts the following highlights:

  • Powerful cleaning due to advanced cleaning driver
  • Easy to use interface
  • Fast and efficient detection (even for NTFS-ADS objects)
  • Special interface for visually impaired people

GRISOFT’s solution, available for download on the site, promises to remove stubborn rootkits at a price any CFO will love. Leave Lady Macbeth in the dust. After all, what’s done is not always done. You have the power to rid your customer’s networks of tricky hidden malware without tugging on the purse strings.

Be sure to look at our open source security tools topic center for more no-cost hints and tips. And if you have an issue involving security threats and countermeasures that needs Macduff‘s touch, ask Russell Dean Vines your hardest questions.

Julia Henderson

April 10, 2007  6:51 AM

Channel news: AMD restructures after 1Q results; Citrix touts app performance

Brein Matturro Profile: Brein Matturro

AMD restructuring after 1q revenue miss With its sales shriveling even more than analysts feared, Advanced Micro Devices Inc. is imposing a partial hiring freeze and clamping down on other major expenses as the slumping chip maker tries to weather a fierce battle with Intel Corp. [AP]

Citrix to corporate IT: Application delivery is strategic The network vendor is pushing its first desktop virtualization offering and calling on application providers and system vendors to educate the market on the value of application acceleration. [eWEEK]

Longhorn April CTP precedes Beta 3 Longhorn Beta 3 still on track, according to Microsoft, as it releases new code this week.

Open source software seeks SOA interoperability Getting open source components to work together in a service-oriented architecture (SOA) is not easy, but the newly formed Open Solutions Alliance (OSA) promises to bring some order to the interoperability chaos.[] Continued »

April 9, 2007  7:11 PM

Secure-email service provider seeks channel partners

Brein Matturro Profile: Brein Matturro

LiveOffice Corp., like many small managed-messaging-service providers, wants to build its channel program while it expands its product offerings.  The new product is a Web-based administration console designed to give customers an easy-access view of the volume of mail and number of threats filtered through the secure messaging gateway LiveOffice maintains for them.LiveOffice uses IronMail, a messaging security gateway system from Secure Computing for spam and malware filtering, remote access to performance indicators, encryption for outgoing messages and detailed searches for archived messages required as evidence for court casesLiveOffice executives said they hope Sentinel will give them enough exposure to sign channel partners outside their existing financial-services customer base. It has expanded its channel program to include three tiers, guarantee resellers a minimum of 15% of a registered deal, and promises to double by the end of 2008 the 15% of its revenue that comes in through the channel. Last year LiveOffice generated approximately $15 million in revenues. 

Nicole Lewis

April 9, 2007  12:06 PM

Channel opportunities in data?

BKraemer Brian Kraemer Profile: BKraemer

Looking for a new channel angle to help business growth? Robert Malone wrote an interesting article for talking about structured and unstructured data and how channel companies can play a role. Malone talks about the fact that as the data streams that are constantly being fed into companies increase, data gets lost, improperly filed away or becomes too difficult to track down.

He mentions two companies — Teradata and Attensity — that are taking on the task of providing the service of sorting, organizing and maintaining these data streams. Sounds like a professional service to me. Will more VARs think about getting on this bandwagon?

Personally, I think they should. How far removed is data management from storage management? Part of the value add could a program or three that will help sort and maintain information before moving it off to be archived and stored. Seems like something that could be bundled into the service.

-Brian Kraemer

April 9, 2007  11:06 AM

The weight of the world — on one IP network

Brein Matturro Profile: Brein Matturro

Experts tout the ability to send voice over an IP network as a plus because telephony and data can be sent on one network, thereby streamlining management of data and voice traffic as well as the network.

That works until users get too enthusiastic about bandwidth-hogging technologies — video and software-as-a-service, for example — and swamp the network, degrading performance and increasing security risks. In many ways, VoIP’s success is putting normal use of networks at risk.

Some VoIP customers have gone from thinking they’d cut corners by converging their networks to finding themselves waiting to complete even simple tasks across an overworked network.

Juniper Networks’ Sanjay Beri, director, product management, says there are three macro trends developing on this front:

The first is the need to appropriately assign bandwidth to specific applications via application-intelligent firewalls and intrusion-prevention systems. Businesses need to determine which applications are business critical and therefore have priority on the network.

The second trend, according to Beri, is a shift in network design; rather than using big pipes to overcome bottlenecks, packet collisions and awkward routing paths, VoIP- and video-enabled networks should be designed for performance, using varying quality-of-service levels to support critical high-performance applications like voice as well as asynchronous applications such as email that tolerate traffic delays. 

And finally, data-center consolidation is forcing network managers to accommodate users who need to access high performance, low latency applications over the WAN, says Beri. This is where WAN optimization and application acceleration products come into play.

The demand for VoIP is keeping VoIP specialists busy and pulling in non-specialists as well — VARs who can tune a network to accommodate the voice gear. If the trend continues — and gets even worse as more end users demand video, video chat and telepresence applications — there may very well be a market for the VAR version of the two barber shops joke: A sign in the window of one barbershop said, “Haircuts: $6.” A sign in the other said, “We fix $6 hair cuts.” 

— Crystal Ferraro

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: