Disk drive failures 13 times what vendors say, study saysThe study showed annual replacement rates of disk drives are as high as 13% annually compared to vendor estimates of under 1%. The study also showed there is no correlation between heat and drive failure. In another revelation, researchers found that Serial ATA drives are just as reliable as Fibre Channel drives that cost up to four times as much per gigabyte. [Computerworld]
Worm uses Symantec tools to infiltrate SQL ServerConsidered a moderate threat, the worm gains access to Microsoft’s SQL Server and SQL databases by exploiting vulnerabilities in Symantec’s antivirus software. [SearchWinIT.com]
Users sound off: HP or Dell serversHewlett-Packard Co.’s is holding its ground as a top vendor in the worldwide server market, but Dell Inc. is a close second. Users say whihc they prefer.[SearchDataCenter.com]
HP taps outsider as Americas channel chiefAfter a four month search, Hewlett-Packard taps a McData Corp. executive to fill the
Americas channel chief post previously held by John Thompson. [ChannelWeb]
Although the two companies have been partners for several years, today’s announcement focuses on the software as a service (SaaS) edition of FreightMatrix. As part of the deal, IBM will be the exclusive hosting provider for the service — which was previously hosted by a third party — and will also help in the sales, marketing and “development” of FreightMatrix.
Dave Mitchell, IBM’s director of strategy for software as a service, said he could not comment on whether IBM will have access to or aid in the development of the program’s code. He was also mum as to what, if any, effect there will be for FreightMatrix’s channel integrators, except to say that “as any application vendor looks at their channel strategy for their SaaS solution, they need to consider that the channel is going to be different,” focusing more on the business processes around the technology, rather than its technical implementation.
IBM spokesperson Kaveri Camire would not comment on whether the deal foreshadows a possible acquisition, except to reiterate that IBM’s “strategy around M&A is aggressive” but it does not discuss acquisitions before they happen.
The channel angle on this story is (ahem) thin. But in the interest of keeping readers informed of remarkable accomplishments being discussed online, we present the most perfect lead sentence to a news story ever:
Lodi News — A jazz musician was injured Friday after jumping from a burning motor home driven by a one-time roller skating stripper from Lodi.
The reality, unfortunately, is less interesting than the facts, despite the exclusion from the lead of information that would have further strained the reader’s credulity (the one-time roller-skating stripper was male), or shattered it completely (alcohol was not a factor).Still, it has potential. We see it as a gender-bending buddy movie directed by John Waters, with Johnny Depp as the jazz musician and Will Farrell as the roller-skating stripper driving the flaming RV.
Men arrested in Stop & Shop data theftsFour California men were arrested in what police said was a scheme to switch checkout-lane credit card readers at Stop & Shop supermarkets as a way to steal customers’ numbers and passwords. [Redmond]
PCI DSS auditors see lessons in TJX data breachFollowing the recent TJX data breach, several PCI Data Security Standard auditors say the retailer violated basic requirements of the PCI DSS. But they say there are lessons to be learned from TJX’s mistakes. [SearchSecurity.com]
Multiple Vulnerabilities in 802.1X SupplicantThe Cisco Secure Services Client (CSSC) is a software client that enables customers to deploy a single authentication framework using the 802.1X authentication standard across multiple device types to access both wired and wireless networks. A lightweight version of the CSSC client is also a component of the Cisco Trust Agent (CTA) within the Cisco Network Admission Control (NAC) Framework solution. [Cisco]
Warezov worm fiends target Skype Dial M for Malware. [TheReg]
It’s no secret that small and midsized businesses (SMBs) are a hot topic these days. Companies like SAP and Oracle are giving SMBs more attention, and analysts predict this trend will continue in 2007.
But it’s also no secret that “SMB,” like so many TLAs and buzzwords, is incredibly broad. The first question to ask anyone who talks about SMBs is what they consider to be the definition of a small company, and what constitutes midsized.
Well, wonder no longer. TechTarget sister site SearchSMB.com has put together a list of how various vendors and analysts define SMBs.
And they’re even nice enough to provide a list of other potential meanings of the abbreviation, so you’ll know when talking to SAP execs that they’re probably not talking about a Server Message Block, or the Society for Mathematical Biology, or — no matter how much having one might help — a Screaming Mechanical Brain. Just feel lucky they’re not talking about Super Mario Brothers or the Steve Miller Band. Even retro cool can’t survive being that retro.
The newest kid on the Linux block got a bit of a kick in the shin earlier this week with the announcement that IBM does not plan to support Oracle Unbreakable Linux. The announcement means that users who have problems running IBM software on Oracle’s Linux distribution will have to go to Oracle, not IBM, to get things working.
Unbreakable Linux is a clone of Red Hat Enterprise Linux, which IBM does support. The decision not to support Unbreakable Linux is due to lack of demand, according to Lisa Lanspery, spokesperson for IBM, as reported by SearchOpenSource.com news writer Jack Loftus.
IBM also supports Novell’s SUSE Linux; it and Red Hat comprise about 90% of the enterprise Linux market together, Lanspery said. If that changes in the future and more customers demand support for Unbreakable Linux, she said, IBM may offer it.
The news from IBM falls in line with earlier sentiments from systems integrators (SIs) and analysts that the battle for Linux dominance doesn’t matter too much to them. Although Novell, Red Hat and now Oracle are all vying to be the leaders in enterprise Linux, SIs can for the most part adapt to what their customers want, and ISVs are safe sticking to the most one or two popular distributions.
Wireless security: IT pros warily watching mobile phone threatsSecurity experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.
Security, compliance, and disaster recovery top the list of remote office and branch office (ROBO) IT priorities, according to a new study by Enterprise Strategy Group. Improving application performance and accessibility for ROBO users were next in line in terms of importance. [Tekrati]
The company’s antipiracy software adds a “yellow state” for times when it just can’t tell if software is genuine. [CNET]
Vendors in the XML application–acceleration market seem to be applauding Cisco Systems Inc.’s acquisition of Reactivity Inc., this week, if only because it validates a broad-based need for appliances that can make complex Web-services based applications run efficiently.
Both analysts and vendors say application-acceleration is one of the hottest part of the networking market right now, as end-user companies try to simplify and accelerate their networks, even as they re-design applications to use those networks more heavily.
Vendors of services-oriented application (SOA) application development and management products say Cisco’s interest proves the need for speed, but also for security, as XML-based attacks increase.
To secure SOA applications, security vendors have to be able to deconstructe SOAP and other Web services protocols and work quickly and securely with the XML itself.
The full version of this story appeared on TechTarget sister site SearchWebServices.com.
The Trojan usually arrives in e-mail, then installs itself as a rootkit, using operating-system functions to capture Web traffic. It detects when a user appears to be posting a comment to a blog, then inserts a linethat asks readers to look at “a fun video.” Clicking on the link takes a victim to a malware site where keyloggers or remote-control software can be dropped on the machine.
The variant is hard to isolate, partly because it changes its form every time it’s downloaded.
Secure Computing recommends looking at videos only on known sites, such as YouTube, instead of following links, even from postings that appear to be from a known source.
The full version of this story appeared on TechTarget sister site SearchSecurity.com.
Who says Linux has to stay in the server room? It may not be on every desktop yet, but the operating system — and open source generally — is coming ever closer to being a household name.
Ideastorm is Dell’s Digg-like suggestion box, where users can submit their ideas and vote on them. The top-five ideas as of the writing of this blog: pre-installed Linux; pre-installed OpenOffice; a bare-bones Windows installation; a Linux laptop; and an option to just buy the computer raw, without any system pre-installed.
Microsoft may be pouring oil on the fire if Vista’s anti-piracy policies end up driving desktop users to Linux, but it probably has a bit of time. Windows is still the main operating system at companies around the world, and Linux applications may still need work before they’re ready to go mainstream.