Search This Blog

Tuesday, January 26, 2010

Loqu8's 'augmented learning' tool; Migrating DHCP to Windows 2008 R2

Migrating DHCP to Windows 2008 R2 | AxCrypt: Open source tool for encrypting files

Network World Microsoft Alert

Forward this to a Friend >>>


Your computer becomes a mentor with Loqu8's 'augmented learning' tool
Alpa Agarwal writes in her Microsoft Startups to Watch blog, "Tim Uy's and Jim Hsia's eyes light up when they talk about 'augmented learning.' Both co-founders of Silicon Valley-based Loqu8, their software applications aim to provide contextual information in a small pop-up window, simply by hovering over a word or two. Say you're writing a digital training plan for the latest IT system your team rolled out. " Read More


WHITE PAPER: Riverbed

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure. Learn more.

WHITE PAPER: HP

Optimize Network Management, Achieve ITIL v3 goals
The key to truly efficient network management software is the ability to integrate with other management software platforms. Find out how HP now provides a completely new, rich set of out-of-the-box integration with HP software as well as third-party applications. Learn more

Migrating DHCP to Windows 2008 R2
Rand Morimoto: Microsoft offers many free migration tools to help organizations migrate from Windows 2003 and 2008 servers to Windows 2008 R2. This article is specifically on the DHCP migration tool. Read More

AxCrypt: Open source tool for encrypting files
Ron Barrett: The ability to encrypt the entire hard drive is a great technology. But, while the ability to encrypt an entire disk has its advantages, there are times when you only need to encrypt certain files. Read More

Database Mirroring over a WAN? Watch out...
Brian Egler: How far apart can Database Mirroring partners be? This was a question that came up during a recent class. The answer is "how long is a piece of string?" Read More


WEBCAST: HP

Need to Backup 10TB+ per Night?
Data deduplication based on grid technology has significant advantages over alternate methods. This video explains how enterprises can; backup 17TB per hour from a single VTL, eliminate human error through advanced automation, increase capacity as needed; save floor space with a smaller footprint, and lower energy costs, Learn more.

SMB 2.x and Interlocking Technologies
Glenn Weadock: We've been discussing SMB (Server Message Block) 2.x and its various benefits, but so far we haven't talked about how the new file-sharing protocol works together with other bits and pieces in Server 2008 R2 and Windows 7. Read More

Alerts based on Merge Conflicts?
Brian Egler: Can we automatically alert someone based on a conflict in Merge replication? Conflicts are resolved automatically but it would be nice to be notified via email that an update was overridden or at least have it logged. Read More

Perspective Network Management
Ron Barrett : Script Logic's network monitoring tool could not be named better. Nothing is more important to a network administrator than...perspective. And with the Perspective network monitoring tool you get exactly that, the ability to monitor, receive alerts and even automatically fix network issues. Read More


WHITE PAPER: SUN

Enabling HIPAA/HITECH Compliance
As healthcare organizations and vendors become more reliant on digital information, complying with increasing regulatory requirements presents challenges. This paper explores the requirements, best practices for implementing identity management systems that help ensure compliance, and Sun's simplified approach. Learn More

Creating a personal brand -- inside and outside the enterprise
Susan Hanley: When I read about the LinkedIn and Twitter partnership late last year, I wondered whether people would really think that it was the "perfect combination." Some people prefer to maintain separate identities. Read More

Are open source business models successful?
Alan Shimel: It has become quite fashionable lately to disparage open source business models as a failure. No less an authority than the NY Times came out late last year with a piece lamenting the elusive nature of successful open source business models. Frankly they are not entirely wrong. Read More

Nothing in life is free (so why do governments love open source?)
Alan Shimel: It seems everywhere you look open source is being adopted, pushed and feted by the governments of the world. Read More

From Microsoft Subnet
This is Network World's Microsoft Subnet news alert in which we focus on the top items from Microsoft Subnet, your source for Microsoft news, blogs, discussion items, security alerts, giveaways and more. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: