Search This Blog

Wednesday, April 29, 2009

Review: Novell's SLES 11; 57 Amazing Things You Didn't Know Your Tech Could Do

The new ground zero in Internet warfare; Senator questions White House control over cybersecurity
Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by ASG
rule

Stopping the Virtualization Sprawl
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.

rule

Spotlight Story
Novell's SLES 11 is packed to the gills and keeps moving at a decent clip

By Tom Henderson and Brendan Allen, Network World Lab Alliance
In our Clear Choice test of Novell's SUSE Linux Enterprise Server (SLES) 11, we found it to be packed with useful management tools, to have virtualization threaded though many of its processes, and to perform at rates close to the high bar set by past versions of the Linux bundle. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

57 Amazing Things You Didn't Know Your Tech Could Do!
Do you often wish that the tech you own or use had superpowers, or that you could transform ordinary gear into something really great--possibly for free? With our amazing instructions, you can!
14 Great Things iPhones and BlackBerrys Can Do
Gmail, Google Maps, and Google Search: 19 Cool Tips
6 Crazy Tricks for Digital Cameras and Photos
3 Tips for iTunes, iPods, Other Digital Music Players
TiVo, Wii, and Xbox 360 Controllers: 8 Clever Tricks

The new ground zero in Internet warfare
When it comes to critical national infrastructure, the highly distributed and ultra-interconnected U.S. power grid is, hands down, the most vulnerable to cyberattack. On this one point, many cybersecurity experts seem to agree.

Follow Network World on Twitter

Senator questions White House control over cybersecurity
The ranking member of the Senate's Homeland Security Committee, Susan Collins, (R-Maine), Tuesday raised questions about recent calls for a direct White House role in coordinating national cybersecurity affairs.

Verizon pursues illegal autodialers
Verizon Wireless said Tuesday it has settled a lawsuit against two companies that used autodialing to call its wireless customers to pitch extended auto warranties. It also announced a separate lawsuit to stop three other companies from similar acts.

Benioff calls for 'the end of maintenance'
Salesforce.com CEO Marc Benioff is well-known for brash pronouncements and on Tuesday delivered his latest, calling for "the end" of traditional software maintenance fees.

New zero-day exploit targets Adobe Reader
Adobe Systems Inc. Tuesday confirmed that it's investigating reports that its popular PDF viewing software, Adobe Reader, contains a critical vulnerability.

Despite Obama's Web 2.0 efforts, e-user satisfaction slips
Despite the Obama administration's efforts to update government web sites, satisfaction with them has fallen for the first time in a year, a survey of 280,000 users of government Web sites found.

Identifying the source of corporate threats
The Verizon Business RISK team recently released its "2009 Data Breach Investigations Report," which gives a fresh look into the question of whether insiders or outsiders are the larger threat group. The report concludes that 74% of breaches result from external sources and "the predominance of total records lost was attributed to outsiders."

Cloud computing security: Who knew?
Bradner: Security has not been much of a consideration in cloud computing --but that may be about to change.

Cisco No. 4 of 20 most profitable techs
Cisco Subnet reports that Cisco is No. 4 in a listing of the 20 most profitable companies in high-tech, according to Fortune. The company trails only Microsoft, IBM and HP, and is ahead of Oracle, Intel, Apple, Dell and several others.

100% trade-in credit for Nortel products
Cisco Subnet blogger Brad Reese takes note of Enterasys' offer to Nortel customers: 100% trade-in credit for Nortel products.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by ASG
rule

Stopping the Virtualization Sprawl
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

04/29/09

Today's most-read stories:

  1. Military enlists open source community
  2. Seven burning security questions
  3. How Bluetooth got as fast as Wi-Fi
  4. BizTalk Server 2009 ready for the public
  5. Some IT skills see pay hikes during downturn
  6. JTAG Hacking
  7. 12 killer freebie SharePoint add-ons
  8. IBM to resell Brocade's Foundry switches
  9. The biggest losers in the Oracle, Sun deal
  10. The downfall of Sun
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: