Latest Technology News from the TechTarget NetworkWednesday, April 21, 2010
- PowerShell remoting in Windows Server 2008 R2
Learn the best methods to enabling PowerShell remoting in Windows Server 2008 R2, including using cmdlets or the Server Manager to configure PowerShell remoting.
- Enterprise flash drives spell doom for tier 1 storage
Enterprise flash drive capacities are set to increase dramatically. Will single level cell and multi-level cell (MLC) NAND flash dominate Fibre Channel hard drives?
- PowerShell commands in Windows Server 2008 R2
Use this chapter excerpt to learn about PowerShell commands for Windows Server 2008 R2, as well as other PowerShell uses, features, enhancements and command types.
- Windows-based attack bypasses file restrictions, network detection
At SOURCE Boston, a researcher describes how Windows filename aliases can be exploited for a variety of application attacks.
- Supporting multiple sessions in Terminal Services
Read IT professionals' questions and answers about Terminal Services Client Access Licenses and using PCs with a fast SATA drive as a terminal server.
- EMC officials admit Clariion and Celerra consolidation afoot
EMC consolidates reporting on Clariion and Celerra revenues into a midtier products revenue number; admits to Wall Street analysts consolidation between two platforms is happening.
- Former Societe Generale trader accused of stealing computer code
Ex-employee allegedly stole proprietary code from bank's high-frequency trading system.
- Travel transaction company modernizing to SOA with large IBM deal
One of the world's largest travel transaction processing companies, Travelport, has begun a large-scale service-oriented architecture (SOA) modernization project and recently inked a multimillion dollar deal with IBM for a significant technological upgrade. The project involves an upgrade to z/Transasction Processing Facility (zTPF) and software from other IBM products lines, including WebSphere, Rational, Tivoli and quite a bit of hardware. Mark Ryan, Travelport's CIO, discusses some of the upgrades to come.
- Social networks take on greater weight in infosec training programs
During a session at InfoSec World 2010, a speaker urged companies to take advantage of the benefits of social networking but also address the risks in a security training program.
- Expert advice for enterprise content management technology purchases
Read expert advice on navigating the enterprise content management technology purchase process – including six questions to ask and answer before talking to vendors.
- Speculation mounts as VMforce details leak
Clues about new VMware and Salesforce.com venture say it will be a development service hosted by VMware and sold by Salesforce.com.
- Automated NCCM can cure the network compliance blues
Enterprises rely on networks to ferry sensitive data, leading to more stringent network compliance auditing responsibilities thrown at the feet of networking pros. Automated network configuration and change management (NCCM) tools can help scale an otherwise tiresome chore.
- EnStratus integrated into Microsoft System Center
The cloud management firm allies with Microsoft's infrastructure management tool suite, giving System Center more of a cloud presence.
- Ramp up SIP trunk security to protect your IP telephony network
Session Initiation Protocol (SIP) trunking can leave your network vulnerable to a variety of attacks. Learn how to implement SIP trunk security and protect your IP telephony network in this excerpt of a chapter from SIP Trunking.
- Poor data quality: what is dirty data costing U.K. organizations?
Poor data quality can have serious financial consequences for businesses. Read about the current state of data quality management at U.K. companies, including dirty data problems.
- Using PowerShell ISE and alias cmdlets
This chapter excerpt details what PowerShell ISE can offer solutions providers, including command and script panes, and how to use alias cmdlets to administer new aliases.
- IT disaster recovery planning and earthquake emergency response: Lessons learned from Haiti
Recent earthquakes in Haiti and Chile moves earthquake emergency response to the forefront of IT disaster recovery planning in many geographic regions, and remind organizations of the unique challenges a disaster of this type poses.
- ERP migration opens up new business avenues for Konkan Railway
Here is the story of Konkan Railway's successful ERP migration project.
- PowerShell profiles in Windows Server 2008 R2
There are four different types of PowerShell profiles in Windows Server 2008 R2, including the all users profile, and you will learn the settings and uses of each of them.
- National cyber security: Real threat, confused state
Recent cyber attacks by the Chinese on India's sensitive IT infrastructure have exposed the loopholes in national cyber security.
- ECM strategy evolves from focus on acquisition to actualization
Find out why companies are turning to advanced search, analytics and other techniques to get more value from data stored in enterprise content management (ECM) systems.
- Virtual security: Developing a plan and procedures
This section of our virtual security guide covers how to design and execute a plan to protect your server virtualization infrastructure's sensitive information.
- Survey: U.K. Data protection technology and procedures are top focus in 2010
A TechTarget survey shows data protection technology and procedures are a key focus of U.K. information security professionals. But rather than invest in big-ticket items such as DLP products, organisations should focus on getting back to data protection basics, according to industry experts.
- Microsoft queues up latest SQL Server; other news
Microsoft readies release of SQL Server 2008 R2; Symantec bolsters hosted partner program; more headlines.
- Ubuntu 10.04 LTS Server Edition promises broad vendor support
Canonical lined up ISV and hardware vendor certifications and support for Ubuntu 10.04 Server Edition rollout.
- Tips to buckle down a midmarket business intelligence strategy
What steps do you need to take to develop a solid business intelligence strategy? Check out these tips on better BI user adoption, governance and creating a cohesive BI plan.
- NetGear ReadyNAS data storage devices now VMware Ready certified
NetGear's ReadyNAS product line is now VMware Ready certified, an important feature for shared storage devices.
- The future of application delivery appliances
This Q&A with Interop track chair Jim Metzler explores the future of WAN optimization controllers and application delivery controllers.
- New version of Zeus banking Trojan spreading fast, Trusteer says
Latest version of banking Trojan targets Firefox users and uses polymorphic techniques.
- How to run apps that aren't Win7-compatible on Win7
Now that organizations are beginning to move to Windows 7, they'll have to consider application compatibility. Terminal Services and virtual desktop infrastructure can help.
- Cloud computing licensing: Buyer beware
One of the major issues with moving applications to the cloud is the effect it has on licensing. It's a complex problem that the vendors have not yet answered. This article digs into the details on what IT pros should be aware of when considering cloud licensing.
- Enterprise Architecture Patterns Quick Guide
In this quick guide, find resources and commentary to help you learn what patterns are and how to put them to use. Also, discover sample patterns to give you ideas about how to use patterns in your organization
- Supreme Court hears 'sexting' case on employee privacy rights
The Supreme Court's decision in a "sexting" case involving a police officer and a pager could broadly affect employee privacy rights -- or not. Either way, the message for CIOs is clear.