Malware outbreak ‘largest in almost a year’ Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.
Cisco wireless products suffer multiple vulnerabilities Cisco Systems is reporting multiple vulnerabilities in Cisco’s Wireless Control System (WCS), Wireless LAN Controller and Lightweight Access Points. [TheReg]
Microsoft delays betas for virtualization software Beta releases for Microsoft’s Viridian hypervisor and Virtual Server 2005 Service Pack have been pushed back. Analysts say ship dates and third-party vendors could be affected too. [SearchWinIT.com]
Indicative takes on big 4 in IT service management The company challenges much larger rivals like IBM and HP with its Indicative performance monitoring and troubleshooting tool. [eWEEK]
Exchange Server 2007 Service Pack 1 beta ready for download Microsoft has begun rolling out the first beta of Service Pack (SP) 1 for Exchange Server 2007, according to a blog posting on Microsoft’s TechNet site. Exchange Server 2007 shipped just over four months ago, in December 2006. [All About Microsoft]
Dell pushes green computing initiative, offers low power AMD servers Dell is offering two new lower power PowerEdge servers using AMD Opteron processors to address power consumption concerns in the data center.[SearchDataCenter.com]
The incredible shrinking SOA vendors Acquisition mania is likely to continue to shorten the list of SOA software vendors, analysts say, but it may not be bad news even for organizations shopping for platforms and tools.[SearchWebServices.com]
Application maintenance colossal pain point for SMBs Forrester Research found that SMBs tend to apply “Band-Aids” rather than fix problems when their application maintenance groups start to falter.[SearchSMB.com]
IBM connects chips for better bandwidth Intel and others have been showing off “through-silicon vias,” but IBM says it will come out with chips using the new technology next year. [CNET]
20% of mobiles to include Near Field Communications by 2012 By 2012, some 292 million handsets — just over 20% of the global mobile handset market — will ship with built in NFC capabilities, according to ABI Research. The analysts believe this year will be critical for NFC technology as key standards and operator trials complete the foundations for the first real deployments. [Tekrati]
Stanford report: what do users do on the Internet? We asked each of our 4000 respondents to select among a list of 17 common internet activities and tell us which they did or did not do. This is what we found.
LeftHand takes iSCSI to 10Gig Slapping SAN and the LAN together. [TheReg]
Apache reignites Sun open source dispute Opens fire with open letter. [TheReg]
Weak Vista launch continues to take its toll on computer industry The release of Vista was supposed to have been a boon for the computer industry, as many were expecting business and consumers to upgrade their hardware at the same time they upgraded their operating system. But, despite Microsoft’s claims to the contrary, the launch has generally been regarded as weak. The upshot is that makers of computers and parts are now being forced to ratchet down expectations. [Techdirt]
Not a good day for Microsoft Microsoft issued yet another critical security update for Windows Vista its most secure version of Windows ever, as part of the company’s Patch Tuesday set of updates. Meanwhile, Goldman Sachs — the Wall Street firm that helped take Microsoft public — issued a note removing Microsoft from its “super-duper buy list,” claiming Microsoft is at a crossroads. [All About Microsoft]
Oracle to patch 37 flaws Database giant Oracle Corp. offered a preview of its April Critical Patch Update (CPU). Fixes are planned for 37 flaws across its product line.
Symantec patches flaw in Enterprise Security Manager Anti-virus vendor plugs hole that could have been exploited remotely. [eWEEK]
Antivirus, firewall protection and security solution provider GRISOFT announced a new free tool for rootkit removal this morning. As the press release says:
“Rootkits are computer code that attempt to hide their actions and processes, making the job of detecting the code and the harmful processes very difficult,” explains Larry Bridwell, VP of Global Security Strategies of GRISOFT. “AVG Anti-Rootkit is developed to detect and destroy rootkits effectively, without bothering users with false alarms.”
The product’s web page boasts the following highlights:
- Powerful cleaning due to advanced cleaning driver
- Easy to use interface
- Fast and efficient detection (even for NTFS-ADS objects)
- Special interface for visually impaired people
GRISOFT’s solution, available for download on the site, promises to remove stubborn rootkits at a price any CFO will love. Leave Lady Macbeth in the dust. After all, what’s done is not always done. You have the power to rid your customer’s networks of tricky hidden malware without tugging on the purse strings.
Be sure to look at our open source security tools topic center for more no-cost hints and tips. And if you have an issue involving security threats and countermeasures that needs Macduff‘s touch, ask Russell Dean Vines your hardest questions.
AMD restructuring after 1q revenue miss With its sales shriveling even more than analysts feared, Advanced Micro Devices Inc. is imposing a partial hiring freeze and clamping down on other major expenses as the slumping chip maker tries to weather a fierce battle with Intel Corp. [AP]
Citrix to corporate IT: Application delivery is strategic The network vendor is pushing its first desktop virtualization offering and calling on application providers and system vendors to educate the market on the value of application acceleration. [eWEEK]
Longhorn April CTP precedes Beta 3 Longhorn Beta 3 still on track, according to Microsoft, as it releases new code this week.
Open source software seeks SOA interoperability Getting open source components to work together in a service-oriented architecture (SOA) is not easy, but the newly formed Open Solutions Alliance (OSA) promises to bring some order to the interoperability chaos.[SearchWebServices.com] Continued »
LiveOffice Corp., like many small managed-messaging-service providers, wants to build its channel program while it expands its product offerings. The new product is a Web-based administration console designed to give customers an easy-access view of the volume of mail and number of threats filtered through the secure messaging gateway LiveOffice maintains for them.LiveOffice uses IronMail, a messaging security gateway system from Secure Computing for spam and malware filtering, remote access to performance indicators, encryption for outgoing messages and detailed searches for archived messages required as evidence for court casesLiveOffice executives said they hope Sentinel will give them enough exposure to sign channel partners outside their existing financial-services customer base. It has expanded its channel program to include three tiers, guarantee resellers a minimum of 15% of a registered deal, and promises to double by the end of 2008 the 15% of its revenue that comes in through the channel. Last year LiveOffice generated approximately $15 million in revenues.
Looking for a new channel angle to help business growth? Robert Malone wrote an interesting article for Forbes.com talking about structured and unstructured data and how channel companies can play a role. Malone talks about the fact that as the data streams that are constantly being fed into companies increase, data gets lost, improperly filed away or becomes too difficult to track down.
He mentions two companies — Teradata and Attensity — that are taking on the task of providing the service of sorting, organizing and maintaining these data streams. Sounds like a professional service to me. Will more VARs think about getting on this bandwagon?
Personally, I think they should. How far removed is data management from storage management? Part of the value add could a program or three that will help sort and maintain information before moving it off to be archived and stored. Seems like something that could be bundled into the service.
Experts tout the ability to send voice over an IP network as a plus because telephony and data can be sent on one network, thereby streamlining management of data and voice traffic as well as the network.
That works until users get too enthusiastic about bandwidth-hogging technologies — video and software-as-a-service, for example — and swamp the network, degrading performance and increasing security risks. In many ways, VoIP’s success is putting normal use of networks at risk.
Some VoIP customers have gone from thinking they’d cut corners by converging their networks to finding themselves waiting to complete even simple tasks across an overworked network.
Juniper Networks’ Sanjay Beri, director, product management, says there are three macro trends developing on this front:
The first is the need to appropriately assign bandwidth to specific applications via application-intelligent firewalls and intrusion-prevention systems. Businesses need to determine which applications are business critical and therefore have priority on the network.
The second trend, according to Beri, is a shift in network design; rather than using big pipes to overcome bottlenecks, packet collisions and awkward routing paths, VoIP- and video-enabled networks should be designed for performance, using varying quality-of-service levels to support critical high-performance applications like voice as well as asynchronous applications such as email that tolerate traffic delays.
And finally, data-center consolidation is forcing network managers to accommodate users who need to access high performance, low latency applications over the WAN, says Beri. This is where WAN optimization and application acceleration products come into play.
The demand for VoIP is keeping VoIP specialists busy and pulling in non-specialists as well — VARs who can tune a network to accommodate the voice gear. If the trend continues — and gets even worse as more end users demand video, video chat and telepresence applications — there may very well be a market for the VAR version of the two barber shops joke: A sign in the window of one barbershop said, “Haircuts: $6.” A sign in the other said, “We fix $6 hair cuts.”
— Crystal Ferraro
Companies propose Ethernet/SAN love-in A gaggle of top networking and storage vendors have submitted a new standards proposal that will allow Fibre Channel protocol over Ethernet networks. [TheReg]
NAC attack: today’s products will fail, report says Vendors say modern NAC products will fall by the wayside in favor of software-based technologies that manage risk by integrating endpoint security, access control, identity and risk management. [eWEEK]
Sun’s complaint on chip maker is dismissed Hynix Semiconductor has won a dismissal of claims by Sun Microsystems that it conspired to drive up memory chip prices, overcharging chip buyers. [NYT]
One of the key announcements at Cisco’s Partner Summit 2007 this week was the Cisco Smart Service — a support-and-monitoring service that Cisco described as halfway between its SmartNet break/fix support service and high-end network management and monitoring services many of its channel partners offer.
The service is a pure resale opportunity for partners; Cisco built the software and maintains the network. Partners can add whatever additional services they want, and charge anything they want, because Cisco keeps the price secret from everyone except partners.
Fortunately we were able to glean a few details about the price list (actually, the price list) and the reaction of some partners to the potential downsides of the service.