Enterprise All-Stars, Interop, DEMO and all the news

Here is this week's Editors' Choice; look for Readers' Choice later this week.


Enterprise All-Stars

Our annual Enterprise All-Stars section honors and profiles 40 enterprise projects that made a difference. Each of the projects profiled advances the use of newer technology or uses mainstream tools in an innovative way. For instance, Papa Gino's and D'Angelo Sandwich Shops stands as a proving ground for chip-level security. Wilson & Company, Engineers and Architects, bucks conventional wisdom and uses freeware to automate configuration across dozens of makes and models of desktops. Alamance Regional Medical Center saves $1 million a year through judicious use of application virtualization.

Complete Interop and DEMO coverage

Even if you attended last week's Interop in New York, check out our summary story: NAC, wireless convergence still works in progress. Our Interop news page will link you to all the major news at the show. Network World Editor in Chief John Dix writes that MPLS, NAC shine at Interop.

From heavy-duty networking to the newest of the new, we switch this week to DEMO, the annual coming-out party for new products and companies. Our DEMO overview will show you what to look for. Cool Tools Editor Keith Shaw is blogging from the show.

From the blogs and forums

Mark Gibbs reports more OS X problems (OS X fans, in turn, tell him it must be something he did). Brodway Joe seeks help getting port mirroring to work on a Nortel 1648 ERS. Alpha Doggs note the tenth anniversary of IBM's AlphaWorks site. James Gaskin recommends two books for SMB users. Paul McNamara composes AND SINGS a song about the HP scandal. Layer 8 reveals the latest photo-caption winner.


Savvis looks to ease infrastucure mgmt. pain

How does Savvis compete with bigger fish in the managed services pond? Savvis President Jonathan Crane says it's not about price, but service on this week's Network World Hot Seat.

How to

Defending your clients against wireless hackers with sniffers

The experts at the Wireless Vulnerabilities and Exploits project answer the question: Can you explain how clients probing for preferred networks can be exploited?

Getting a Linksys wireless router and a PIX to work together

Ron Nutter helps a user figure it out.

In depth

Consortium releases authentication algorithm

Businesses have to facilitate sharing of data over the network, while preventing theft or unauthorized access of that data in an increasingly hostile environment. Organizations must be able to establish the identity of the remote entity with a high degree of certainty. The Initiative for Open Authentication (OATH) is developing technology to enable strong authentication of all users on all devices, across all networks, such as its algorithm for one-time passwords.

All the news

AT&T, Verizon have hands full integrating billing systems

Last year's multibillion combinations of Verizon-MCI and AT&T-SBC resulted not only in the two biggest U.S. carriers but in two monster billing-integration projects.

Cisco switch gear aims at data center

A pair of new Cisco switch products released this week - an eight-port, 10G Ethernet core switch module and a Gigabit Ethernet blade server switch - are targeted at high-traffic enterprise data centers that require large network pipes and low traffic latency, the company says.

Compact device protects laptops

An Israeli start-up has unveiled a gateway, about the size of a fat harmonica, that's designed to make mobile laptops on the road as secure as desktops in the main office.

Gartner forecasts security troubles

Security software is mandatory for companies facing an Internet community of aggressive hackers and criminals. But corporations shouldn't feel locked into deals with their security vendors, a Gartner analyst said.

Open source unlocks options for many small-to-medium sized businesses

When Tony Losey came to the 3Sixty Group in 2003 he saw that, like many small companies, the manufacturing firm didn't have much in the way of advanced systems. It was running an old ERP system on machines that dated back to 1992, there was no company Intranet and executives had pushed the company's Web site, a key business driver, to an outside hosting provider.

Deduplication: Stop repeating yourself

Data deduplication, data reduction, commonality factoring, capacity optimized storage - whatever you call it - is a process designed to make network backups to disk faster and more economical.

Google ups document capacity on corporate search appliance

Google has enhanced its enterprise search device, doubling its capacity and adding new query capabilities.

Motorola sees Symbol at heart of goals

Motorola is getting a lot for its $4 billion buyout of Symbol Technologies. But whether that includes a future for what Motorola executives call enterprise mobility remains to be seen.

Spam fighters cede ground in escalating conflict

Computer security analysts who fight spam face the same thankless task as goalkeepers: They don't get much credit for the unsolicited e-mail they stop, only demerits for the ones that get through.

BEA focuses on flexible, collaborative SOA

As IT managers continue to wrangle with creating and managing service-oriented architectures -- in which application components are used and reused to meet business demands -- BEA Systems is focusing on providing an underlying open platform for cohesive, companywide SOA.

Hurd to share HP board leak investigation

In one of his first public acts to address the burgeoning HP spying scandal, CEO Mark Hurd plans to brief reporters Friday about the findings of an analysis conducted by the company's law firm.

IBM ships next version of content management software

IBM Wednesday released Version 6.0 of its Workplace Web Content Management platform, adding new authoring and editing features, that promise to give users the same tool for managing any Web-based content regardless of where it is published.

Dell, Symantec offer e-mail security management

Dell and Symantec on Wednesday rolled out a hardware/software package for controlling, archiving and securely managing Microsoft Exchange e-mail environments in small and midsize businesses.

Merger unites providers of services that target external, internal security threats

SecureWorks announced Wednesday it has acquired LURHQ in a stock swap that combines the forces of two managed security services providers.

SIMposium report: Ensuring the future growth of IT

Stephen Pickett, Society for Information Management president, shares his views from the organization's annual meeting in Dallas this week.

FCC's wireless spectrum auction fetches $14 billion

Five weeks and nearly $14 billion later, the FCC's Advanced Wireless Services auction is over.

Sprint beefs up wireless security services

Sprint is expected to announce a new suite of security services for its wireless users on Tuesday that includes authentication, threat protection and policy enforcement on smart phones from any wireless service provider.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2006 IDG Communications, Inc.

IT Salary Survey: The results are in