Date: Wed, 23 Mar 2005 14:19:01 -0500 (EST)
From:"NWC Online" <NetworkComputing@update.networkcomputing.com>
Subject: Network Computing Online #2.97 -- APC--The Data Center on Wheels
-- Network Computing Online #2.97 --
Your Online IT Resource
http://www.networkcomputing.com/
Wednesday, March 23, 2005

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

>From wireless mobility to regulatory compliance to converged 
voice, data and video networks, IT professionals have never faced
such a complex set of challenges - or such a powerful array of 
innovations for solving them. Only NetWorld+Interop Las Vegas 
2005 provides a comprehensive, systems-wide approach that 
addresses the full range of challenges you face. Register before
March 31st and save up to $200!!! 
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0NVo0EO 
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._


Here's what's cooking on NWC Online this week!

1) The Daily Blog
     - Connection Managers
     - Picture Messaging Interoperability
     - APC--The Data Center on Wheels
2) YackITyYack
     - Business Strategy Channel
     - New Mobile and Wireless Blogger
     - Top 11: Tradeshow Gimme
     - Tech Support Haiku Winner
     - Compliance Channel on Network Magazine
     - Network Magazine's Reporter's Notebooks: We Report, You Comment
     - Network Magazine's Weblog: Blog with Me
3) Calling All Readers
     - New! KnowledgeStorm Library
     - Microsoft Roadmap Feature
     - TechQuiz: Enterprise VoIP Solutions
     - E-poll: Business Process Management
     - Reader Survey: Guide to Professional Development Strategies
     - E-Poll: Mobile Messaging
     - Survey: Business Intelligence and Microsoft Office:
        Market Trends and Integration Practices
     - NPA: Call for Annual Awards Nominations
4) Special Training
     - Building, Deploying and Securing Wireless LANs
5) Editors' Picks
     - XBRL: DRAG-TO-TAG?
     - Don't Skip a Beat
     - Informatica Joins Grid Computing Group
     - Amazon's A9 Breaks Search Barriers
     - Phishing and Trojan Attacks Continue to Grow, Symantec Says
     - The Qosmio F15: The Media Fan's Notebook
     - Featured White Paper: A Shared Global Vulnerability: 
Cyberattacks
        on Business Operations
6) Download Mania
     - Webroot Desktop Firewall
     - UltraStats Site Monitor 1.0
7) Eye on Security
     - Alertcon: Sun Vulnerability in Java Web Start Technology
     - Security Threat Watch: Linux 2.6 Kernel and LimeWire Client
        Vulnerabilities
8) Coming Events
     - Mobilizing Enterprise Applications to Improve Business
        Performance
     - Transforming IT Using ITIL Best Practices: Optimizing Service
        Delivery
     - E-mail Security: The Battle Against Spam, Viruses and Online
        Fraud
     - J2EE: A Standard in Jeopardy
9) Subscription Information

Look for the next Network Computing Online newsletter on Wednesday,
March 30, 2005!


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

1) The Daily Blog

a) Connection Managers
Connection managers are the software utilities that allow users to
control their wireless network connections used with cellular-data
networks, WLANs and Wi-Fi hotspots. These managers may also configure
items such as protocol stacks, COM ports, and Bluetooth and IR
configurations.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHnx0Ex

b) Picture Messaging Interoperability
Verizon Wireless and Cingular Wireless have just announced
interoperability for their picture messaging services, technically 
known
as Multimedia Messaging Services. Now, Cingular subscribers will be 
able
to take pictures with their camera phones and send them to Verizon
subscribers and visa versa.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHny0Ey

c) APC--The Data Center on Wheels
Have you seen this picture? It's the APC "data center in a semi."
Unbelievable. It's got a NOC, racks, cooling, satlink... Everything you
need for the ultimate in disaster recovery. They lease them and they
sell them. Need a data center that can run from a spreading disaster?
Give APC a call; they've got you covered.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRh0EF

Read more entries from The Daily Blog.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0B5MU0EU

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

2) YackITyYack

a) Business Strategy Channel
Opinionated? You betcha! Controversial? Of course! Rob Preston, David
Joachim and Tim Wilson provide "no holds bared" commentary on the 
latest
industry business transactions and how those moves will impact your 
job.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DGR30EL

b) New Mobile and Wireless Blogger
We're pleased to bring you a new voice in our Mobile and Wireless
Channel, Peter Rysavy. Each week, Peter will blog on Wi-Fi technologies
and mobile communications infrastructures, focusing on 
interoperability.
Welcome Peter!
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DGR40EM

c) Top 11: Tradeshow Gimme
This week, we're looking for the "Top 11 tradeshow booth giveaways we'd
like to see." Make us laugh, and we'll print your entry here and 
online.
Here are a couple ideas to get you started.
--A working piece of software
--A personal Roomba vacuum with six-pack docking station
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0CEhF0Ex

d) Tech Support Haiku Winner
Thanks to those of you who submitted IT technical support haikus. Our
best entry this week belongs to Rob Heller for this tearjerker:

When did I save last?
UPS is crying softly,
Sitting in the dark.

We feel your pain Rob.

Submit your best poem today for a chance at next issue's honors.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRZ0Ez

e) Compliance Channel on Network Magazine
Industry expert Penny Lunt Crosman heads up Network Magazine's Channel
on Compliance. Each week, you'll find plenty of news and commentary on
current events. Tune in for updates on the latest on SOX techniques,
compliance initiatives and more.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRa0E7

f) Network Magazine's Reporter's Notebooks: We Report, You Comment
We're re-launching our reporter's notebook section with lots of space
for your comments.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRb0E8

g) Network Magazine's Weblog: Blog with Me
Read our editors' insights and add your own.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0CmJ60Er

And, don't miss the May issue when Network Magazine will be honoring 
the
best innovations of 2004.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DAyM0EK

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

3) Calling All Readers

a) New! KnowledgeStorm Library
Let our new KnowledgeStorm library help you find the right information
to make informed technology decisions. Search through top categories
including security solutions, networking and communications solutions,
enterprise content management, business intelligence solutions and 
more.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRd0EB

b) Microsoft Roadmap Feature
Wish you could query Microsoft on the areas that are affecting your
business now and down the road? Network Computing is gearing up to do
just that in our special Microsoft Roadmap feature. Our Technology
Editors will quiz VPs and product managers to find out Redmond's plans
for the upcoming year so we can help you prepare for upgrades and new
initiatives in six key areas: security; management, including desktops
and common engineering criteria; storage; OS platforms, both desktop 
and
server; business apps, including development tools, middleware and SQL
Server; and collaboration and convergence. Send project coordinator 
Curt
Franklin your burning questions. We'll select a few in each of these
areas to pass along to Microsoft and answer in our July 21 issue of
Network Computing.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRe0EC

c) TechQuiz: Enterprise VoIP Solutions
Are you considering VoIP for your enterprise? There's still time to 
take
our latest quiz to see if you're armed with the necessary smarts to 
make
the move to a converged network. If you can outsmart our editors, we'll
throw your name into the hat for a free NWC collectible pen/stylus.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0TNs0EQ

d) E-poll: Business Process Management
Got business processes that could use streamlining? Maybe what you need
is a BPM (business process management) suite. Problem is, BPM vendors
are coming out of the woodwork and promising everything from simply
monitoring processes to enforcing business policies to making your EAI
tool obsolete. And they rarely mention the vast amount of upfront work
that's required for success. Luckily, help is on the way: Network
Computing is embarking on a major analysis of BPM offerings that will
cut through the hype. But we need your help. Please take our survey at:
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRf0ED

e) Reader Survey: Guide to Professional Development Strategies
How important to you is the opportunity to grow professionally as
opposed to just raking in the big bucks? Remember that professional
development isn't just technical training; it's also about developing
communications and project management skills, for example. NWC
Contributor Jonathan Feldman is working on a guide to professional
development strategies, and he needs your help. Please take a moment to
answer a few questions; your responses will guide Jonathan as he
prepares his report. Thank you for your participation.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRg0EE

f) E-Poll: Mobile Messaging
Network Computing is producing a story addressing developments in
wireless e-mail for an upcoming issue focusing primarily on the use of
e-mail on mobile devices such as PDAs and smartphones. We will be
examining the different approaches used, including hosted solutions and
enterprise-deployed solutions, and we'll be evaluating a number of
solutions in our labs. We would like to get input from you, our 
readers,
about current and planned use of wireless e-mail. Your perspectives on
this important topic are important to Network Computing and its readers
and can influence vendors to provide better products. We would like to
request five to seven minutes of your valuable time to answer the
following questions. We will keep your answers anonymous and
confidential. Please take our survey at:
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHnz0Ez

g) Survey: Business Intelligence and Microsoft Office:
Market Trends and Integration Practices
Along with our research partner, Ventana Research, we need your help.
Please take a few minutes to complete this brief survey that examines
the priorities, actions and needs of organizations faced with
integrating Microsoft Office and business intelligence systems into a
seamless information dissemination environment. Thank you for your
participation.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DDod0Ea

h) NPA: Call for Annual Awards Nominations
Join the Network Professional Association on May 4, 2005, for its 
annual
meeting and Awards for Professionalism at this year's NetWorld+Interop
in Las Vegas. Members, log in to receive your conference registration
priority code.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DGR80EQ

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

4) Special Training

Building, Deploying and Securing Wireless LANs:
A Hands-On 3-Day Immersion Learning Program for Network Professionals
and Engineers
Presented by Network Computing and the Enterprise Architecture Group

About 20 percent of IT budgets are now dedicated to wireless products
and services. About half of midsize and large enterprises are using
wireless data today and another 30 percent are planning/evaluating
future use. Most current wireless users plan to substantially increase
their usage in the future as well. Are you ready?

During this powerful, three-day hands-on course, you will learn to:
* Design an effective and secure wireless LAN and lock it down against
threats.
* Manage and deploy wireless applications.
* Plan for short- and long-term technology migrations as standards
evolve.
* Balance your access and security requirements.

Register now, space is limited.

Course Dates and Locations:
March 29-31 / Atlanta, GA
April 5-7 / Dallas, TX
April 19-21 / San Jose, CA
May 3-5 / Denver, CO
May 17-19 / New York, NY

To register, call (410) 531-0559 or go to:
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRc0EA

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

5) Editors' Picks

a) XBRL: DRAG-TO-TAG?
What's holding XBRL back?
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHcy0En

b) Don't Skip a Beat
It's no longer enough to have a backup solution and a business
continuity plan. The newest goal for disaster recovery calls for
providing the exact level of recovery each application demands.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHTx0EX

c) Informatica Joins Grid Computing Group
Informatica's server-grid capabilities are designed to optimize and
distribute workflow across multiple networked CPU nodes.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn10Em

d) Amazon's A9 Breaks Search Barriers
The company offers a collection of technologies that allow content
providers to syndicate search results from their own search engines.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DG3t0Et

e) Phishing and Trojan Attacks Continue to Grow, Symantec Says
Businesses suffered an average of 13.6 security attacks per day in the
second half of 2004, up from 10.6 daily attacks in the first six months
of the year, says the latest Internet Security Threat Report from
security vendor Symantec.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn20En

f) The Qosmio F15: The Media Fan's Notebook
"Everything but the kitchen sink" is an over-used phrase that,
nevertheless, is the best way to describe Toshiba's Qosmio F15
multimedia notebook. This is the kind of multimedia playground that any
media fan would love.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn30Eo

g) Featured White Paper: A Shared Global Vulnerability: Cyberattacks on
Business Operations
Information security has traditionally been a reactionary process, the
marshalling of technology in response to already exposed and exploited
vulnerabilities. But when new threats appear that can deliver a fatal
blow to essential business operations, taking a reactive approach to
security is no longer a viable strategy.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn40Ep

See more white papers, research abstracts, case studies and product
information in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHRd0EB

For additional research, check out our online encyclopedia providing
Web-based definitions of IT terms.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0XQ0Ec

You can find links to these and other breaking news stories organized 
by
technology via our handy NetNews Service.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0CJp80Ew

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

6) Download Mania: Select Files From IT Pro Downloads

a) Webroot Desktop Firewall
Webroot Desktop Firewall offers great two-way protection. It keeps your
data safe while also keeping hackers out. Novice users will appreciate
the easy setup of Webroot Desktop Firewall, while experts can fine-tune
it to their advanced needs using the sophisticated features and 
options.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DG1K0EC
Size: 2,481k
Platform: Windows
Licensing: Shareware

b) UltraStats Site Monitor 1.0
UltraStats Site Monitor is a simple utility to display the real-time
traffic graph of your Web site on the screen of your PC.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DG1M0EE
Size: 780k
Platform: Windows
Licensing: Freeware

Note: By using IT Pro Downloads you agree to these terms of use.
http://www.itprodownloads.com/terms.jhtml

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

7) Eye on Security

a) Alertcon: Sun Vulnerability in Java Web Start Technology
Sun's J2SE version 1.4.2_06 and earlier 1.4.2 releases for Windows,
Solaris and Linux could allow an untrusted application to gain
unauthorized privileges because of a vulnerability within the Java Web
Start technology.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0Btri0EU

b) Security Threat Watch: Linux 2.6 Kernel and LimeWire Client
Vulnerabilities
The most significant vulnerabilities this week involve the Linux kernel
and the LimeWire client. The Linux 2.6 kernel series was found to
contain multiple bugs when handling malicious ISO9660 (i.e., CD-ROM)
file systems. Reading an untrusted CD could result in local system
crashes or worse. The LimeWire client vulnerability allows remote
attackers to read arbitrary files off the system (subject to the local
LimeWire user's ACLs).

For more information.

Linux 2.6 kernel: ISO9660 file system local vulnerabilities
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn50Eq

LimeWire client: multiple vulnerabilities
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn60Er
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHn70Es

For more security alerts and information, sign up for our free Security
Threat Watch newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0CCEc0Ep

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

8) Coming Events

a) Mobilizing Enterprise Applications to Improve Business Performance
--An InformationWeek Vendor Perspectives TechWebCast
Thursday, March 24, 2005
9:00 AM PST / 12:00 PM EST
Discover how 50 of the Fortune 100 enterprises are able to deliver
business-critical applications to their mobile professionals. Learn how
to securely deploy and manage information for your mobile professionals
where they need it most--at the point of business.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DFZR0Ex

b) Transforming IT Using ITIL Best Practices: Optimizing Service
Delivery
--An InformationWeek Vendor Perspectives TechWebCast
Wednesday, March 30, 2005
9:00 AM PST / 12:00 PM EST
Industry experts discuss how organizations can benefit from ITIL (IT
Infrastructure Library) best practices--from ensuring availability to
implementing change control. Discussion points include an overview of
ITIL and its components, leveraging ITIL to improve service quality and
guidelines for implementation.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DGSM0Em

c) E-mail Security: The Battle Against Spam, Viruses and Online Fraud
--An InformationWeek Editorial Perspectives TechWebCast
Wednesday, March 30, 2005
11:00-12:00 AM PST / 2:00-3:00 PM EST
We'll look into how IT organizations are setting up security strategies
in enterprise e-mail management, including prioritizing security 
threats
and developing a proactive security policy, leveraging the benefits of
e-mail management and more.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHPI0Eg

d) J2EE: A Standard in Jeopardy
--A Network Computing Research & Advisory Perspectives TechWebCast
Tuesday, April 12, 2005
11:00-12:00 AM PST / 2:00-3:00 PM EST
The future of the J2EE standard is uncertain. Market forces, including
commoditization, open-source alternatives, new disruptive technologies
and the maturing Microsoft.NET framework, will change the landscape of
the J2EE industry. Burton Group Senior Analyst Richard Monson-Haefel,
one of the world's leading authorities on Java and J2EE, explains these
threats and provides strategic insights and practical recommendations.
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0DHPK0Ei

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

>From wireless mobility to regulatory compliance to converged 
voice, data and video networks, IT professionals have never faced
such a complex set of challenges - or such a powerful array of 
innovations for solving them. Only NetWorld+Interop Las Vegas 
2005 provides a comprehensive, systems-wide approach that 
addresses the full range of challenges you face. Register before
March 31st and save up to $200!!! 
http://update.networkcomputing.com/cgi-bin4/DM/y/emvg0GPvuP0G6u0NVo0EO 
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

Put Us On Your White List
Don't let an over-eager e-mail filter bounce the Network Computing
Online newsletter! Our address:
NetworkComputing@update.networkcomputing.com

needs to be in your address book or on your anti-spam white list. Ask
your admin or ISP how to do this, or check your anti-spam utility
documentation.

As always, we welcome your feedback about our newsletter. Please feel
free to message us directly if you have any comments or questions
(mailto:nwconline@cmp.com).

Important subscription contacts:
CMP Media LLC
600 Community Drive
Manhasset, NY 11030

Change your e-mail address.
http://networkcomputingsubscriptions.com/customerservice/

Sign up for your own issue of this newsletter.
http://www.submag.com/sub/nc?wp=wpdly2

Subscribe to Network Computing newsletters.
http://www.submag.com/sub/nc?wp=wpdly2

Still not receiving your own FREE subscription to Network Computing
Magazine? http://networkcomputingsubscriptions.com/customerservice/

Note: This newsletter utilizes dynamic URLs. For more information,
please refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

Copyright (c) 2005 Network Computing, a CMP Media LLC publication
http://www.nwc.com/