MY PROFILE | PRIVACY 

Vol. 16, #18 - May 9, 2011 - Issue #827

IT Cloud Resistance Redux

  1. Editor's Corner
    • WServerNews Sent From A New IP Address!
    • IT Cloud Resistance Redux
  2. Admin Toolbox
    • Admin Tools We Think You Shouldn't Be Without
  3. Webinars & Seminars
    • VIPRE Antivirus Business Product Demonstration - 5/10
    • BriForum 2011: Register today
  4. Tech Briefing
    • How To Use A Known IPv6 Hole To Fast Freeze A Windows Network
    • Cloud Drives Cisco To Open Source
    • 11 Free Microsoft Tools You're Overlooking
  5. Windows Server News
    • Calculating The Cost Advantages Of Private Cloud
    • Is Microsoft Desktop Virtualization For You?
    • Virtualization Hardware: The Complete Guide
    • Adopt The Right Hyper-V Tools For Your Windows Environment
  6. Third Party News
    • Microsoft Security Essentials Struggles In Antivirus Tests
    • Symantec To Send Backup Exec To The Cloud
  7. WServerNews FAVE Links
    • This Week's Links We Like. Tips, Hints And Fun Stuff.
  8. WServerNews - Product of the Week
    • BOOK: CYBERHEIST - Give This Book To Your Boss
  9. How to use the mailing list
    • Instructions on how to subscribe, sign off or change

Get The Fast And Easy Antivirus Protection You Deserve

You need an antivirus solution that makes your world simpler and your
employees safer. VIPRE Antivirus Business provides exactly that. Fast
installation and system performance. Easy management and updates. But
don't take our word for it. Try VIPRE today and see for yourself. For
a limited time, get VIPRE Business for just $10 per seat.

Editor's Corner

WServerNews Now Sent From A New IP Address!

Hi All,

We are sending WServerNews from a new IP address: 64.38.52.82, as after the acquisition of Sunbelt by GFI, this e-zine is no longer coming from Sunbelt, but from the Techgenix group. So if you suddenly get this issue after not having seen it for a while, that might be the reason. Or, if you suddenly stopped getting your weekly issue, check your spam folder and/or firewall access lists and white-list this new address?

Thanks very much!

IT Cloud Resistance Redux

Wow, quite a few of you responded to this one. I'm quoting some snippets of emails to show you the problems that crop up in this kind of discussion. The gap between IT and corporate can be quite significant:

"I work for a small, privately owned hospital that, due to budget constraints, is a little behind the curve on complying with HIPAA regulations. Mind you, we are not even talking cloud here, just internal security of patient records mandated by federal regulations. My boss, the Director of IT, is constantly battling with corporate over proper security and funding what is necessary to comply. They just don't see, I don't know if it's can't or won't, that security is an issue. Even the little stuff is a fight, they saw no reason to spend the money."

Another one:

"I read your comments and wish you all the luck with your embracing of the Cloud model; what bothers me is that you don't mention that there are companies that cannot embrace public cloud methodology for a lot of tangible, business relevant reasons. Working with a representative from Amazon and their calculator; I found that running five persistent instances of the servers we needed with sufficient storage and bandwidth to service our needs would cost us over $34,000 a month. Doing that ourselves in a colo would be a 1/17th of the cost. Your statements and my comments both oversimplify a complex formula that needs thorough vetting on both sides of the conference table."

And here is another perspective:

"The more I see articles pushing the business sense for cloud computing, the more I wonder why don't they look at what it would take to convert a small, medium-sized, and large shop to all-cloud. What are we going to do with all the hardware and software we were pushed to buy from Microsoft and Dell to run our business? What kind of conversion assistance can we expect to push email to the cloud? What size of Internet pipes are we going to need to give our users the same response time we currently provide for the 10Tb+ of storage we need?

"I would think that a new business would be able to take advantage of Amazon and Gmail pricing - it'd be fun to design and implement something from scratch. But there's a reason that there are still a number of large businesses using COBOL - the massive cost of development and conversion is just too much. The business side may see a benefit for cloud computing, but do they see the actual cost?"

Of course these are all completely valid viewpoints. Cloud is not a magic button that will work all the time.

Quotes of the Week

"I've been lucky. Opportunities don't often come along. So, when they do, you have to grab them." - Audrey Hepburn.

"No matter where you go, there you are." Popular expression, claimed to be first coined by Confucius (551- 479 BC).

"Since light travels faster than sound, some people appear to be bright until you hear them speak." - Brian Williams.

Warm regards, and thank you for being a WServerNews subscriber. No trees were killed in the sending of this message, but a large number of electrons were terribly inconvenienced. Please tell your friends about us.
They can subscribe here: http://www.wservernews.com/subscribe.htm

Stu email me: [email protected] 

CYBERHEIST - Give This Book To Your Boss

Cyberheist was written for the owners and management of Small and Medium Enterprise, which includes non-profits, local and state government.Why? Eastern European organized cybercrime has evolved, and moved beyond simple identity theft. Attacks are rapidly getting more sophisticated. They are now going after your employees. They bypass your antivirus security software and 'social engineer' your employees to click on something. From that point forward they hack into your network and put keyloggers on accounting systems. You can guess the rest. A few days later the organization's bank accounts are empty. Another cyberheist victim. Buy and Read the Book! http://www.wservernews.com/go/1304673701212-cyberheist

Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

Subscribe to the latest hot e-zine: CyberheistNews: 'Arming you with the facts'. Gets you ammo twice a month to defend your network against cybercrime: http://gurl.im/8c5c140
                               ---                      
Frustrated with gullible end-users causing malware infections? Find out who the culprits are in 10 minutes. Do the Free Phishing Security Test on 100 users!: http://gurl.im/809d17a
 

Webinars & Seminars

VIPRE Antivirus Business Product Demonstration - 5/10

Join us for a look at VIPRE Antivirus Business, powerful, high-performance endpoint malware protection, which combines antivirus and antispyware into a single agent. Plus take a deep dive into other new features including scalable multi-site tiering and role-based access control: 2:00PM EDT / 11:00AM PDT / 18:00 GMT

Date: Tue, May 10, 2011 This is an Internet based event.
Register/More Info: http://www.wservernews.com/go/1304934794388-Vipre-seminar-2011-05-10  

BriForum 2011: Register Today

The most advanced, technical, hands-on desktop virtualization event is returning to Europe this May and Chicago this July. Independent industry experts, led by Brian Madden, share the latest tips and strategies around desktop virtualization, VDI, application virtualization, and Remote Desktop Services. Register today:http://www.wservernews.com/go/1304935038987-briforum-2011  

Tech Briefing

How To Use A Known IPv6 Hole To Fast Freeze A Windows Network

Networkworld wrote: "At last week's Rocky Mountain IPv6 Summit in Denver, Ed Horley began his talk about IPv6 in Windows networks by warning attendees about a dangerous DoS vulnerability that Microsoft has so far shown no interest in fixing. I had a longer conversation about it with Horley. He pointed me to the YouTube video below that shows the hole in action.
More: http://www.networkworld.com/community/blog/known-ipv6-hole-freezes-windows-network-in-minutes 

Cloud Drives Cisco To Open Source

Again in Networkworld: "There's an interesting post on GigaOm this week on how cloud computing is forcing Cisco to embrace open source. It argues that Cisco realizes open source software will be critical to its success in cloud due to the emphasis on application development. The post explains how Lew Tucker, CTO of Cisco's cloud computing division, learned long ago that IT was all about developers, and that he's now applying that logic to Cisco. An example is Cisco's participation in OpenStack - an open source cloud computing platform project - and the company's recent submission of Network as a Service (NaaS) to OpenStack's existing computing
and storage underpinnings.

Both were catalyzed by Tucker, the GigaOm post asserts. NaaS would give OpenStack developers APIs with which to develop applications for creating and managing virtual networks.
More at their site: http://www.networkworld.com/community/blog/cloud-drives-cisco-open-source 

11 Free Microsoft Tools You're Overlooking

Tony Bradley at PCWorld found a few good ones that I did not know about either. "Microsoft has a virtual monopoly on desktop operating systems with Windows and on office productivity with its Office suite--as well as a dominant share of the Web browser market with Internet Explorer. For many, though, Microsoft is the big, evil corporation robbing the defenseless masses, while Google is the Robin Hood of the Web, altruistically delivering free goods and services. However, although you might not realize it, Microsoft also offers many of the same tools and services as Google- and also for free: http://www.pcworld.com/businesscenter/article/227178/11_free_microsoft_tools_youre_overlooking.html

Windows Server News

Calculating The Cost Advantages Of Private Cloud

Private cloud can save you money - but only if it's used in the right situation. This chapter excerpt from "Visible Ops Private Cloud: From
Virtualization to Private Cloud in Four Practical Steps" explains when you should use private clouds and the value in estimating the pricing
benefits of an in-house cloud: http://searchcloudcomputing.techtarget.com/feature/Calculating-the-cost-advantages-of-private-cloud?utm_source=sCloudComputing&utm_medium=EMAIL&utm_campaign=HOUSE-Content_Sharing-May0611&utm_content=cloudcosts&Offer=mn_eh050611CLCPCSHR_cloudcosts 

Is Microsoft Desktop Virtualization For You?

Redmond has a free resource that is actually useful. Desktop Virtualization provides a comprehensive suite of solutions that enables companies to give their employees flexibility to work everywhere; simplifying compliance and management through a centralized and unified infrastructure. Learn how IT is empowering users with Desktop Virtualization with this on-demand roundtable: http://www.microsoft.com/windows/enterprise/solutions/virtualization/dvroundtable2011.aspx 

Virtualization Hardware: The Complete Guide

Virtualization hardware can make or break an infrastructure. The right hardware decreases costs, and improves resource allocation and server consolidation ratios. Access this guide to explore the various hardware options available to you: http://searchservervirtualization.techtarget.com/tutorial/Virtualization-hardware-The-complete-guide?utm_source=sServerVirtualization&utm_medium=EMAIL&utm_campaign=HOUSE-Content_Sharing-May0611&utm_content=social_media&Offer=mn_eh050611SRVTCSHR_virthardware 

Adopt The Right Hyper-V Tools For Your Windows Environment

Microsoft Hyper-V may be popular because it comes free as part of the Windows Server license, but that doesn't mean IT managers should ignore best practices when managing a virtual environment. Ensure your organization is adopting the right Hyper-V tools for your Windows environment in this expert tip: http://searchwindowsserver.techtarget.com/tip/Adopt-the-right-Hyper-V-tools-for-your-Windows-environment?utm_source=sWindowsServer&utm_medium=EMAIL&utm_campaign=HOUSE-Content_Sharing-May0611&utm_content=4ways&Offer=mn_eh0506911WSVRCSHR_hyper-v     

Third Party News

Microsoft Security Essentials Struggles In Antivirus Tests

InfoWorld broke this story: "Microsoft's popular free antivirus program Security Essentials has put in a mediocre showing in the latest quarterly tests from German test outfit AV-Test.org, finishing second to the bottom out of 22 products.

In Q1 2011 Security Essentials 2.0 (MSE) performed well at the least demanding test, that of spotting malware drawn from the industry-agreed Wildlist selection, scoring 100 percent. It also put in a good performance against a large group of recent malware samples selected by AV-Test itself, with a creditable score of 97 percent detection. Her are the details: http://www.infoworld.com/d/security/microsoft-security-essentials-struggles-in-antivirus-tests-010 

Symantec To Send Backup Exec To The Cloud

eWEEK reported that "In yet another move of a standard, server-based application to an offsite alternative, Symantec revealed May 3 that its venerable and market-leading BackUp Exec will be adding a cloud-based option later this year.

"The company made the announcement--one of several, in fact--at its annual Symantec Vision conference in Las Vegas. Symantec's Backup Exec.cloud, aimed at small businesses or remote offices that want to wash their hands of IT infrastructure, will be a hosted, automated backup service that protects files on Windows desktops and servers with a straightforward user interface for online backup and recovery.

"Thus, it will soon compete directly with such marketshare-grabbing services as EMC Mozy, Seagate's i365, CommVault, Acronis, Amazon S3 and others for the SMB cloud storage business": http://www.eweek.com/c/a/Data-Storage/Symantec-to-Send-Backup-Exec-to-the-Cloud-851550/ 

WServerNews FAVE Links

This Week's Links We Like. Tips, Hints And Fun Stuff

WServerNews - Product of the Week

BOOK: CYBERHEIST - Give This Book To Your Boss

Cyberheist was written for the owners and management of Small and Medium Enterprise, which includes non-profits, local and state government. Why? Eastern European organized cybercrime has evolved, and moved beyond simple identity theft. Attacks are rapidly getting more sophisticated. They are now going after your employees. They bypass your antivirus security software and 'social engineer' your employees to click on something. From that point forward they hack into your network and put keyloggers on accounting systems. You can guess the rest. A few days later the organization's bank accounts are empty. Another cyberheist victim. Give this book to your boss! http://www.wservernews.com/go/1304673801505-cyberheist-Give-This-Book-To-Your-Boss  

How to use the Mailing List

About Your Subscription to WServerNews This message was sent to ##SubscriberEmail## . This is a posting from WServerNews. To manage your subscription please visit: http://www.techgenix.com/newsletters-subscription.htm

What Our Lawyers Make Us Say  These documents are provided for informational purposes only. The information contained in this document represents the current view of Sunbelt Software Distribution on the issues discussed as of the date of publication. Because Sunbelt must respond to changes in market conditions, it should not be interpreted to be a commitment on the part of Sunbelt and Sunbelt cannot guarantee the accuracy of any information presented after the date of publication.

INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.

This newsletter and website and may contain links to other websites with whom we have a business relationship. Sunbelt Software does not review or screen these sites, and we are not responsible or liable for their privacy or data security practices, or the content of these sites. Additionally, if you register with any of these sites, any information that you provide in the process of registration, such as your email address, credit card number or other personally identifiable information, will be transferred to these sites. For these reasons, you should be careful to review any privacy and data security policies posted on any of these sites before providing information to them.

The user assumes the entire risk as to the accuracy and the use of this document. This document may be copied and distributed subject to the following conditions: 1) All text must be copied without modification and all pages must be included; 2) All copies must contain Sunbelt's copyright notice and any other notices provided therein; and 3) This document may not be distributed for profit. All trademarks acknowledged.