Title: searchWin2000.com - Win2000 and Industry News
;)
| LEAD STORY |
| A fish story: Microsoft's fleet goes deep (SearchWin2000) |
;) |
| |
;) |
How do you get a tuna from the sea to the seafood section or turn a sailfish into a sold fish as efficiently as possible? One fishing firm reeled in Microsoft's fleet of products to do the job. But it wasn't always smooth sailing. Sometimes their migration was as much fun as getting caught in a nasty Puget Sound squall.
|
|
SPONSORED BY: Unisys
;)
Unisys -- The Windows mainframe company
FREE ANALYST REPORT: Walklett Group consultants, who focus on corporate business intelligence (BI), have taken a hard look at platform costs. They enter the Unix versus Windows fray with "Cost Analysis for a BI Solution in a VLDB Environment," in which they compare Sun/Oracle and Unisys/Microsoft. If you're looking for the most cost-effective high-performance BI solution, this report is a must read.
;)
Click here for your FREE ANALYST REPORT. |
|
NEWS
Transaction log monitor tracks SQL Server activity (InternetWeek)
If you've been looking for a way to keep a keener eye on your SQL Server database and rescue lost data from the brink of oblivion, you may want to look at Lumigent Technologies. The company has cranked out some software that watches the database's transaction log. If a problem crops up, Log Explorer Version 3.0 will help you sniff out who made changes to database data -- and then correct the problem.
NEWS
Linux contract treads on Microsoft turf (CNET)
Germany doesn't want to be too "abhaengig" (dependent) on Microsoft's products. That explains why the government signed a deal with IBM and Linux player SuSE that makes it easier for federal, state and local governments to use open-source products. Under the deal, governments can buy IBM computers running SuSE Linux at a reduced price. German officials are afraid if they put all their eggs in the Microsoft basket, a single security weakness could cause widespread problems.
DAILY HEADLINES
All headlines, including those below, are available from our news page.
;)
ONLINE EVENT
Keeping Johnny out of the command line
Who: Roberta Bragg, author and columnist
When: Jun 06 at 02:00 PM EDT (18:00 GMT)
This Thursday, learn how users (and hackers) can gain access to system resources through XP admin, registry editing and hacker tools, and discover a simple strategy that can prevent this abuse. Pre-register today for this Live Expert Webcast.
SPONSORED BY: CommVault
;)
COMMVAULT GALAXY IS FEATURED IN NEW MICROSOFT BEST PRACTICES GUIDE FOR WINDOWS 2000 DATA CENTER BACKUP AND RESTORE. If you're responsible for providing this protection for your data-center environment, Backup and Restore Solution for Windows 2000-based Data Centers is for you. Let us know what you think?
;)
Download the free guide today! |
FEATURED TOPIC
Reining in users
What network hasn't suffered because a user downloaded a game that turned out to be a Trojan horse? Check out the security resources in this week's Featured Topic.
MEMBER POLL
Where do you stand on MS Licensing 6.0?
July 31 approaches! Where do you stand on Microsoft Licensing 6.0? Are you ready? Currently taking stock of what software you have? Still haven't decided if you're going to get with this program? Not a clue what you've got or what you're going to do? Cast your vote in our current member poll!
KNOW-IT-ALL QUIZ OF THE DAY #182
Test your IT knowledge!
This extension of the Point-to-Point Tunneling Protocol is used by an Internet service provider to enable the operation of a virtual private network over the Internet:
a. Transmission Control Protocol
b. First Protocol
c. Link Control Protocol
d. Layer Two Tunneling Protocol
WIN2000TALK
Radio for geeks
Two years after Microsoft .NET was introduced, most users still don't know what it is or how to use it. Experts dig in to .NET on this week's edition of this weekly radio Webcast. The bottom line: developers should become familiar with Web services protocols and start experimenting with Microsoft's .NET programming tools. Useful server products will begin to roll out next year.
THE MISSING LINK
Oops! True IT blooper #36: A drive-by incident
;)
A net admin gets hit by an IT "drive-by." Suddenly, he's under the gun and in a gnarly neighborhood known as Blooperville, thanks to a printer under profound pressure.
|
|
;) |
;)
SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
;)
NEWS EDITOR
Ed Parry
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
;)
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
;)
ASSISTANT EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your ideas for online event and discussion day topics.
;)
DAVID PYE
Assistant Editor
[EMAIL PROTECTED]
Send me your tips, white papers and favorite Web sites.
;)
SENIOR ACCOUNT EXECUTIVE
Mike Kelly
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.
|
|
|
|
|