Welcome to This Week on NW Fusion, featuring breaking news, info, and tips from Network World Fusion, the most comprehensive enterprise networking resource on the Internet. See below for the week's biggest stories and check out our other e-mail newsletters at http://www.nwfusion.com/focus 1) Showtime for Linux1) New feature: IT Briefings Webcasts2) Doubts dog Microsoft spam plan3) Microsoft to make its software ‘behave’ 4) It’s a new domain-name game5) Wireless Wizards: Subnetting a wireless LAN for voice 6) Nutter’s Help Desk: Software or appliance solution for viruses?7) Face-off: Software or appliances for spam?8) Hackers: What are they thinking?9) Review: Foundry Networks’ Big Iron MG810) Review: Secure Shell software11) A Wider Net: Gamers get a league of their own 12) Technology Update: XrML keeps content under control13) Management Strategies: Clearing out the old stuff14) SOHO WLAN vendors weigh value of WPA cert15) Network certification choices grow with Cisco 16) Accellion to manage e-mail attachments17) Town’s VoIP net delivers Amber alert system18) Laurel’s ShadeTree software branches out19) VoIP to be scaled down, untethered at VoiceCon20) Novell previews business-continuity cluster1) New feature: IT Briefings WebcastsNetwork World’s top editors offer their expert insight on a wide range of networking topics. Listen to these Webcasts to get advice on how best to integrate emerging technologies into your networks, market trends and what’s ahead in networking. We start this week with two: Senior Editor Tim Greene discusses SSL VPNs and Senior Editor Deni Connor takes a look at the importance of information life-cycle management.DocFinder: 9967https://www.nwfusion.com/it-briefing/2) Doubts dog Microsoft spam planEven with Microsoft lending its clout to an expanding anti-spam movement centered on authenticating e-mail senders, experts caution the approach comes laden with technical challenges and unanswered questions.DocFinder: 9952https://www.nwfusion.com/news/2004/0301microsoftspam.html3) Microsoft to make its software ‘behave’Microsoft’s revelation last week that it is adopting a new approach to computer security dubbed “behavior blocking” represents a radical shift in the company’s software design strategy that could pay off for attack-weary Windows users, industry watchers say.DocFinder: 9944https://www.nwfusion.com/news/2004/0301microsoftrsa.html4) It’s a new domain-name gameSales of specialized domain names are expected to increase, and Internet regulators plan to select several new industry-specific extensions later this year.DocFinder: 9943https://www.nwfusion.com/news/2004/0301tld.html5) Wireless Wizards: Subnetting a wireless LAN for voiceThe Wizards help out a user charged with building a 2,000-user wireless voice network. Note: This week, we expand our stable of Wizards; see how all the new ones answer the question.DocFinder: 9965https://www.nwfusion.com/columnists/2004/0301wizards.html6) Nutter’s Help Desk: Software or appliance solution for viruses?Ron Nutter helps a user decide.DocFinder: 9966https://www.nwfusion.com/columnists/2004/0301nutter.html7) Face-off: Software or appliances for spam?And over in the forums, Tim Chiu, senior manager, Mirapoint and Ken Schneider, CTO for Brightmail, debate the best way to keep spam off your network. Read their opening statements, then jump in with your comments.DocFinder: 9921https://www.nwfusion.com/cgi-bin/forum/gforum.cgi?post=11948) Hackers: What are they thinking?Knowing hackers’ favorite attack patterns and motivations can lead to better network security. Learn about the behavior and patterns exhibited in actual attacks against a bank, online merchant and brokerage firm, and what countermeasures you can take to guard against such incidents.DocFinder: 9953https://www.nwfusion.com/research/2004/0301hackers.html9) Review: Foundry Networks’ Big Iron MG8A true 10G Ethernet switch, but failover tests raise resiliency issues.DocFinder: 9954https://www.nwfusion.com/reviews/2004/0301revfoundry.html10) Review: Secure Shell softwareNew SSH Communications’ offering adds ease of use to its Tectia package.DocFinder: 9955https://www.nwfusion.com/reviews/2004/0301revssh.html11) A Wider Net: Gamers get a league of their ownNo joke. As the popularity of computer games such as Counter-Strike, Battlefield 1942 and Xbox Live has soared, professional-grade competitions have sprouted worldwide. And they pay cash prizes that are getting bigger every year.DocFinder: 9942https://www.nwfusion.com/news/2004/0301widernetgames.html12) Technology Update: XrML keeps content under controlExtensible Rights Markup Language is an XML-based language that determines rights and conditions for the use of electronic content to protect it from unauthorized use.DocFinder: 9956https://www.nwfusion.com/news/tech/2004/0301techupdate.html13) Management Strategies: Clearing out the old stuffDon’t let your storage rooms get overrun by obsolete equipment.DocFinder: 9957https://www.nwfusion.com/careers/2004/0301man.html14) SOHO WLAN vendors weigh value of WPA certSOHO WLAN vendors disagree on value of Wi-Fi Protected Access certification.DocFinder: 9958https://www.nwfusion.com/net.worker/news/2004/0301netlead.html15) Network certification choices grow with CiscoSome say the slew of Cisco certifications has become an alphabet soup of titles, and others add that no piece of paper outweighs experience and intelligence.DocFinder: 9959https://www.nwfusion.com/news/2004/0301specialfocus.html16) Accellion to manage e-mail attachmentsWith the proliferation in volume and size of attachments taxing e-mail systems, Accellion is introducing an updated version of its caching and management appliance designed to boost network performance and let companies consolidate servers.DocFinder: 9960https://www.nwfusion.com/news/2004/0301attach.html17) Town’s VoIP net delivers Amber alert systemFew incidents can raise community angst, awareness and action like a missing-child report. So when Herndon, Va., had a chance to implement the national child-abduction warning system known as “Code Amber” last fall, it went all out, converging its telecom, e-mail and data networks into a high-speed VoIP environment to support the new application.DocFinder: 9961https://www.nwfusion.com/news/2004/0301herndon.html18) Laurel’s ShadeTree software branches outEdge router maker Laurel Networks last week unveiled software that it says enhances its router’s broadband and Ethernet service performance, and lets service providers upgrade the system without deactivating the network.DocFinder: 9962https://www.nwfusion.com/news/2004/0301laurel.html19) VoIP to be scaled down, untethered at VoiceConVendors this week at VoiceCon will introduce IP gear designed to give small and midsize businesses sophisticated voice and data capabilities while converging all their traffic on one network.DocFinder: 9963https://www.nwfusion.com/news/2004/0301voicecon.html20) Novell previews business-continuity clusterNovell is expected to announce a business-continuity product this spring that lets IT administrators cluster as many as four geographically separate storage-area networks to replicate and mirror data among each other for disaster recovery.DocFinder: 9964https://www.nwfusion.com/news/2004/0301novell.html Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe