This week’s top 10 IT blog posts are indeed awesome; Carl Brooks clears up the confusion around how confusing cloud computing is (and isn’t), Dave Raffo outlines the details of Coraid’s alleged patent infringement, and Laura Smith explains the Heaven-sent security solution straight from Back to the Future. And that’s only three of them, check them out for yourself!
1. VMware adopts per-VM licensing, pricing from the Search Server Virtualization blog by Colin Steele.
2. Coraid pulls Z-Series NAS after NetApp threatens lawsuit from Storage Soup by Dave Raffo.
3. SQL injection flaw leaves door wide-open to valuable user information on a popular file sharing site from Software Quality Insights by Dan Mondello.
4. 2010 Magic Quadrant for Enterprise LAN: Few changes for a rapidly evolving industry from The Network Hub by Shamus McGillicuddy.
5. So what’s up with this storage array that doesn’t use any sort of RAID? from SQL Server with Mr. Denny by Mr. Denny.
6. RHEL 6 Beta 2 released from the Enterprise Linux Log by Leah Rosin.
7. Biometric fingerprints find new, mobile audience from Total CIO by Laura Smith.
8. Cloud confusion? Does not compute from The Troposphere by Carl Brooks.
9. vSphere vs. Azure: The real battle from the Search Server Virtualization blog by Colin Steele.
10. Oracle to face challenges in pushing customers to its complete stack from Eye on Oracle by Mark Fontecchio.
Is your favorite blog post not on this list? Share it with us and others via email or in the comments section!
Derek Catanzaro is a senior network administrator for a company based in Lake Forest, Illinois. His over fifteen years of IT experience—in networking, Lotus Notes/Domino, BlackBerry Enterprise Server, and VPN solutions—have turned him into a busy bee around IT Knowledge Exchange. He’s been the go-to guy for Lotus Notes for the past couple months, and we really appreciate it! Thanks again, Derek.
Join the ranks of our featured members by getting involved: ask and answer questions over at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away three $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
Updated March 8, 2011: Permission is no longer necessary to approve answers. If you run into problems approving answers to questions you have asked, please contact us directly.
Updated July 15, 2010 5:11 PM: Permissions to approve answers must be granted.
Each day, our forums are chock full of new questions. Thanks to each of you, these questions don’t go floating off into the oblivion of the Internet, but rather they get answered, discussed and solved. But much like history, IT-related problems tend to repeat themselves and old questions can continue to help stumped IT pros long after the original inquirer has moved on.
One way to maximize the saving powers of older questions is to approve the answer that worked for you. It’s always great when multiple members get in on a discussion, offering ideas and methods, but this can cause confusion in future readings of the thread. If you’ve asked a question and you’ve received a suggestion that worked for you, approve the answer by clicking the gray check mark next to it! Not only will you pass along community love, you’ll give us a heads up to approve the answer for future users. Plus you get Knowledge Points if your answer is approved! (Knowledge Points can get you all kinds of goodies: Amazon Gift Cards, contest prizes, or good old-fashioned street cred.) Approved answers show up in the Answers Wiki with a big green check mark next to it and, in case that isn’t prominent enough, a large Approved Answer stamp.
If you have any suggestions or questions, send them over! Reach me via email at Melanie@ITKnowledgeExchange.com, in the comments section or by submitting a question in the forum. Happy answering (and approving)!
To compete in the new economy, organizations need to provide efficient and secure access to their internal applications and data for external entities, such as business partners, customers, and mobile employees.
Join Microsoft’s Senior Technical Product Manager, Brjann Brekkan, on July 20 from 11am-2pm ET for Microsoft Business Ready Security – Identity Access Management. He will discuss managing these redundant identities to avoid infrastructure complexities, inefficiencies, and increased security risks.
Get a reminder email.
This is the current—and hastily organized—state of Michael’s desk. Help him out? If you want some sweet IT books, head over to IT Answers and get to answering. See a question tagged Windows 7 in 2010 and know the answer? Give it your best shot then send me an email at Melanie@ITKnowledgeExchange.com or send us a message @ITKE with the link to the question, and you’ll get to take your pick of Michael’s deskmates. We’re giving five away, so get started!
Some titles to get you excited:
A Practical Guide to Fedora and RedHat Enterprise Linux 5th ed. (Full Fedora on DVD)
A Practical Guide to Linux Commands, Editors and Shell Programming 2nd ed.
Securing the Borderless Network: Security for the Web 2.0 World
Cisco Unified Computing (UCS)
CCIE Professional Development: Deploying and Troubleshooting Cisco Wireless LAN Controllers
Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
Jhamn, or Julie Ann, is a Notes Specialist with expertise in server administration. She’s been with us at IT Knowledge Exchange for almost two years now, dedicating her past couple months answering questions on Lotus Notes. She’s also spurred some great discussions, like this one on user permissions in Lotus Notes. Thanks for being an active part of the community, Julie Ann!
Want to join the ranks of our featured members? Get involved by asking and answering questions over at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
Mr. Denny was all over this week’s most-watched IT questions, giving great answers and suggestions all around. Have your own bit of knowledge on SQL Server? Head over to one of these questions and help him out!
1. Davewaltonuk was looking for SQL Server 2008 code to find fields containing similar text, and Mr. Denny gave it his best shot.
2. Mr. Denny quenched Mike800’s curiosity about linking users of Access 2003 to a SQL Server 2008 database.
3. Swales101 needed some help changing over to DR database from SQL 2005, and Mr. Denny (of SQL Server with Mr. Denny) was all over it.
4. If you need help creating Oracle triggers like RizwanSharief did, Meandyou provided an answer that’s been approved.
5. KulkarniMandar asked his first question: How can I write a SQL query to get the database name? Mr. Denny and Meandyou helped him out. Welcome to the community, Mandar! Continued »
This week’s member highlight goes to Pkpatel1151, who was busy this week answering your questions on Cisco, WAN and VPN. No wonder, since he’s got experience in Cisco networking, WAN, LAN, WLAN, and VPN. Paresh from Illinois is a jack-of-all-trades! Thanks for joining us, Pkpatel1151; we’re glad to have you!
Some related questions:
Want some pointers on becoming a featured member? Ask and answer some great questions at IT Answers. You’ll earn Knowledge Points that count toward our latest contest; we’re giving away $50 Amazon Gift Cards and two Xbox 360 Slims. Upload a photo and update your profile so we can properly strut your stuff!
This week’s top 10 blog posts have received the official seal of awesomeness by none other than you, the readers. Did your favorite blog post from this week not make it onto the list? Share it with everyone by highlighting it in the comments section. Meanwhile, check out what everyone else has been reading this past week:
1. Time for another MSDN Ultimate Giveaway! from SQL Server with Mr. Denny.
2. RHEL 6 Beta 2 released from the Enterprise Linux Log by Leah Rosin.
3. 2010 Magic Quadrant for Enterprise LAN: Few changes for a rapidly evolving industry from The Network Hub by Shamus McGillicuddy.
4. Coraid pulls Z-Series NAS after NetApp threatens lawsuit from Storage Soup by Dave Raffo.
Join IT Knowledge Exchange and Microsoft for these Upcoming Live Expert Chats
Today’s workforce faces a constantly evolving landscape of threats to information and infrastructure—and even to regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, resulting in lost productivity and real financial losses at businesses worldwide.
Microsoft Business Ready Security – Secure Endpoint
Join us on July 13th from 11:00am-2:00pm EDT for Microsoft Forefront – Are Your Endpoints Secured? to learn how Microsoft Forefront solutions protect client and server operating systems from emerging threats and information loss, while enabling more secure access from virtually anywhere. Click here for a reminder email for this expert live chat.
Microsoft Business Ready Security – Identity and Access Management
Join us on July 20th from 11:00am-2:00pm EDT for Identity Access Management: Is your IT Infrastructure Secure? During this live chat you’ll learn about Microsoft’s solution to enable more secure, identity-based access to applications, both on-premises and in the cloud. Click here for a reminder email for this expert live chat.
We hope to have you there!