In other news, researchers warn of a new security hole in Mozilla Firefox that could allow attackers to tamper with cookies.
There’s a story making the rounds today that Microsoft is poised to sign a new technology partnership with Red Hat that could be as sweeping as the one it signed with Novell. There’s only one problem with the report: Red Hat is denying it.[All About Microsoft]
Purchase of RTLinux technology–used for devices like animatronic robots–opens new markets for
Wind River’s embedded Linux efforts. [CNET]
SanDisk looks to cut executive salaries and eliminate 250 jobs. [DailyTech]
SQL Server 2005 SP2, which is required for use with
Vista and Office 2007 is now ready for downloading.[SearchWinIT.com]
Storage continues to be a hot topic among VARs, customers and the tech world in general. One area that’s had the magnifying glass help up to it is continuous data protection (CDP). The debate among experts is: which is better — true CDP or near CDP? True CDP offers a granular level of information management that allows for the storage “tape” to be rolled back to any point in time. This way, if any data is lost, true CDP has already captured it and can restore it. You may know a consumer product with similar capabilities: TiVO. Near CDP is basically taking a snapshot of a database on a predefined schedule — say, every ten minutes.
Still not clear on CDP? Get the low down on everything VARs need to know about CDP with our guide, Delivering continuous data protection services.
If you already use the technology, you should look at this article on the CDP debate by Jo Maitland on SearchStorage.com. That debate may be moot if Mendocino can carry through with the promises that it is making.
One other piece of storage news of note: Open-source storage? This is one story that all storage VARs should be following. The opportunity to provide a storage service in an inexpensive, affective manner is astounding — not to mention that in addition to providing a valuable service, the opportunities for reoccurring revenue make the head spin.
All signs point to the end of life for EMC’s Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel.
EMC stoops for the midrange, while NetApp stretches for the high end. [eWEEK]
User Account Control: insecure by design? [TheReg]
Multiple vulnerabilities are found in Cisco PIX 500 Series Security Appliances and the Cisco ASA 5500 Series Adaptive Security Appliances. [Cisco]
People actually redeeming vouchers [TheReg]
Google studied the reliability and performance history of a hundred thousand of its SATA and PATA drives with between 80 and 400GB storage and 5400 to 7200rpm, and while unfortunately they didn’t call out specific brands or models that had high failure rates, they did find a few interesting patterns in failing hard drives. [Engadget]
It’s in the nature of the channel beast that VARs, SIs and computer consultants need to know every computer woe that might, could, may, does, does not exist and what could help, or might harm a customer’s business. There always will be a need to refine assessment tools.
This week Microsoft released its Business and Technology Assessment Toolkit free to its partners. According to our site, SearchITChannel.com, partners are giving it the thumbs up. Both Evolve Technologies, Inc, and Computer Consulting Inc credit Microsoft for making their jobs easier. Dave Sobel, president of Evolve Technologies, Inc says it increased his deal close rate increased by 20 percent.
Basically, this tool kit provides a set of questions for the tech-heavy VAR to ask his or her not so tech-savvy clients. This communication tool provides general best-practices assessment recommendations and is not Microsoft centric.
So if you got your free toolkit, but can’t install it, Office Small Businesses 2007 retails at $279 and Office Professional 2007 retails at $329 at CompUSA. Thanks, Microsoft!
On February 6th, Julia Henderson, of SearchSecurityChannel.com fame, told us of a study that revealed some of the weaknesses of site-authentication images. This study was the most damning to banks, such as Bank of America, who have instituted the security method for their online banking sites.
However, an article in today’s Guardian offers a report that paying attention to the secure nature of the log-in page for your bank may be the least of your worries. According to the article, the Royal Bank of Scotland has been struggling with “systematic attempts” by “organized hacking gangs” to compromise the organization’s security via executives working from home.
The hackers, evidently, work under the assumption that systems used outside of the office are less secure than those under the umbrella if corporate IT. Through emails designed to appeal to the specific user targeted and keylogging software, the attackers are able to get into the company’s system through the VPN.
As telecommuting becomes more and more popular, VPN security, including its weaknesses, will become increasingly important to the integrity of corporate networks.
Okay. We know that blogging is the next big thing. We know that bloggers are getting invites to the coolest parties, the most exclusive criminal courtrooms, and IT product conferences.
Wait, what? That’s right, folks. An article from Information Week explained that 13 bloggers were invited to last week’s Fast Search and Transfer meeting. The idea was that the bloggers would rant, rave, criticize, and inform Fast right to the forefront of the new challenge to find solutions that gather unstructured data. Fast is a growing enterprise search platform vendor who thinks that group blogging is an important factor for search in Enterprise 2.0. (If you want to know what bloggers are saying about Enterprise 2.0, check out Dion Hinchcliffe’s blog)
As a VAR, SI or consultant, maybe you should plan to get a few friends together to blog in order to drive product improvements. Fast insists that it is paying attention to what the bloggers are saying — and taking criticism and fresh ideas seriously — because they think that bloggers inform companies like Fast about their core culture. So if you have a complaint, blog about it! Vendors are listening.
Speed could kill for Internet worms
Computer security researchers are developing ways of protecting PCs from malicious programs known as worms by monitoring how fast data is sent through networks. [TimesOnline]
Europe demands say on US data trawling
Wants to rein in war on terror. [TheReg]
SAP skills pay off big for IT pros
The values of CCIE, CISSP, PMP and Web development certifications held their own in 2006, but it was nothing compared to the 15 percent income growth experienced by ERP-skilled IT workers in 2006, according to a new report. [eWEEK]
Data center power update: power use is alarming; or…not
- U.S. servers slurp more power than Mississippi
Power-hungry servers consumed 45 million kilowatt-hours of power in 2005–double that of 2000. [CNET]
Demand grows, but data centers don’t hog power
Data centers are sucking up more electricity as more people and organizations log on to the Internet. But there’s been some disagreement over how power-hungry the servers running the nation’s network are. [SanFranChronicle]
- Microsoft accuses IBM of an ‘ulterior’ standards agenda
Chicken hawk. [TheReg]Office 14: Think first half of 2009
Office 14, the follow-on to Office 2007, is due out in the first half of calendar year 2009, according to a slide deck allegedly from Microsoft, posted on the AeroXperience blog. [All About Microsoft]
HP updates low-end Itanium servers
Two dual-processor models flesh out HP’s Itanium-based Integrity line, and new HP-UX boosts software performance. [CNET]
Citrix to marry workload management with presentation server
Citrix has acquired the workload management assets of the privately held Aurema.. [eWEEK]
Symantec CEO says no to Windows Vista
Leading security software chief says Windows Vista isn’t yet for him — or his company. Principled stand? Or PR grandstand?[DailyTech]
Visual Studio security updates released
Microsoft has released security updates for Visual Studio 2002 and Visual Studio 2003. The patches address a vulnerability that could allow for remote code execution. [SearchVB.com]
Microsoft Corp. issued six “critical” security patches on Tuesday to fix flaws in its software products that the company warned could allow attackers to take control of a user’s computer. [Reuters]
The Windows 7 genie is out of the bottle. Trying to stuff it back in will do nothing but create more customer confusion.
[All About Microsoft]
The Intrusion Prevention System (IPS) feature set of Cisco IOS. contains several vulnerabilities. These include: Fragmented IP packets may be used to evade signature inspection. IPS signatures utilizing the regular expression feature of the ATOMIC.TCP signature engine may cause a router to crash resulting in a denial of service. [Cisco]
IBM says it is developing new circuitry that could triple the data stored on a typical microprocessor, and thereby double the performance of computers, the Wall Street Journal reported on Wednesday. [Reuters]
The announcement comes as analysts tout virtualization’s entry into its 2.0 phase. [eWEEK]
Citrix Systems this week unveiled a major update to its flagship Citrix Presentation Server product line, a move that kills off its Access Suite and incorporates its functionality into a new Premium Edition. [ChannelWeb]
If you’ve only heard about Vonage and Skype when it comes to VoIP, you’ve only scratched the surface. Dozens of startup companies from the U.S., Canada and Europe are bringing out innovative IP telephony products. Here are our picks for the Top 25 new VoIP companies set to change the way we all work and do business [VoIPNews]
Unit picks up 3G signals, routes them over ‘net.. [TheRegister]
As chip engineers gather in
San Francisco, Intel shows off its teraflop chops, and AMD talks pricing pressure and power consumption. [CNET]
Linux license delayed by Novell/Microsoft review
The partnership between Microsoft Corp. and Novell Inc. has delayed completion of a new license that will govern rights to key parts of the Linux operating system. [Reuters]
IE and Firefox cough up hard drive contents
Updated Floor by flaw. [TheReg]
OIG report criticizes FBI over missing laptops, weapons
A report by the Office of the Inspector General finds that the FBI reported two to three laptops lost or stolen per month during a 44-month period. [eWEEK]
Congress pushes (again) for ISP data retention
Silicon Justice. More data = more damage, when breached. [TheReg]
Cisco’s new security target: consumers
The multibillion-dollar player in security tools for businesses plans to move into the lucrative consumer market later this year. [CNET]
Cisco Sees video surveillance as IP security opportunity
The networking giant says it can help enterprises integrate their existing video surveillance technologies—using a centralized IP network-based approach—to create new applications for keeping their operations even more tightly under wraps. [eWEEK]
Mobile malware menace hits high – McAfee
3GSM Should telcos be scared or skeptical? [TheReg]
Avaya to offer VOIP to small businesses
The new version of IP Office caters to businesses with 10 to 20 users, allowing them to use the SIP trunking services from service providers for their outside phone lines, potentially cutting calling plans by half. [eWEEK]
System integrators effectively serve federal government
More than half of U.S. government IT decision makers are satisfied with the overall performance of systems integrators, according to Government Insights, an IDC company. The survey also found that many SIs are shifting from performing the integration to managing the process of integration. [Tekrati]
IBM’s Power6: Bigger iron, lower power
IBM’s new chip works in 64-processor servers and contains features to let users cap system power consumption. [CNET]