• Oracle Introduces Oracle(r) Information Lifecycle Management Assistant 26 Feb. 2007 Vitaly Popovich

    REDWOOD SHORES, Calif. 26-FEB-2007 05:10 AM Oracle today announced the general availability of Oracle(r) Information Lifecycle Management Assistant (Oracle ILM Assistant), the industry's first, free tool to provide customers with a comprehensive range of Information Lifecycle Management (ILM) capabilities for Oracle Database 10g. Building on Oracle's commitment to meeting the needs of its customers, Oracle ILM Assistant significantly eases the challenge of designing and implementing a strategy to manage the lifecycle of information. With an increasing amount of information in the enterprise, organizations are required to store vast amounts of data for extended periods of time to meet new regulatory data retention and protection requirements. A recent study of members of the Independent Oracle User Group (IOUG) found that 92 percent of respondents expect their database storage needs to increase in 2007. To meet this growth, 64 percent of respondents said they will increase their spending on storage in 2007. The report, "Managing the Storage Equation: The Converging Roles of Data and Storage Professionals," was produced by Unisphere Research(1). By implementing an ILM strategy, customers can benefit from reduced storage costs by keeping a minimum quantity of data on high cost storage devices. In conjunction with the partitioning capabilities of Oracle Database 10g, Oracle ILM Assistant enables users to define lifecycles -- when it is time to move or purge data -- enabling the maximum quantity of data to be retained at the lowest cost. In addition, Oracle ILM Assistant features simulated table partitioning, storage cost modeling, and reports on security and compliance features in use. The reliability and scalability of Oracle Database 10g coupled with Oracle Partitioning provides the ideal environment for managing business ILM because the data lies all in one place instead of being stored in multiple formats. As the number of rows in large tables continues to grow, da

  • SYMANTEC PROVIDES COMPLETE PROTECTION AGAINST TODAY’S EVOLVING SECURITY THREATS WITH NORTON 360 24 Jan. 2013 Vitaly Popovich

    CUPERTINO, Calif. - Feb. 26, 2006 - Symantec Corp. (Nasdaq: SYMC) today announced the availability of the newest product to join its award winning line of Norton products - Norton 360. The comprehensive solution combines Symantec's proven, industry-leading technologies for antivirus, antispyware, firewall, intrusion protection, antiphishing, backup and tuneup, eliminating the need to purchase and manage multiple products. The all-in-one security service protects computers and the information stored in them from Internet threats and risks, as well as data loss, allowing computer users to freely engage in their everyday online activities without worry. Norton 360 helps restore computer users' trust in the online world with transaction security features that protect against online fraud. Norton 360 also diagnoses and fixes common computer problems, optimizing PC performance and speed. Automation, breadth of functionality, user experience and performance are the key design principles for Norton 360. Designed to work as automatically as possible, Norton 360 provides comprehensive protection while performing its duties in the background without interrupting users' computing experience. The product is designed to offer a user experience that is reassuring, helpful and unobtrusive as the underlying technologies are seamlessly integrated for maximum performance and efficiency. "People today use their computers for much more than work or storing documents. If you ask most computer users what they rely on their PC for, they'll tell you they use it to surf the web, bank online, shop, keep in touch with friends and family, listen to music and store their favorite photos," said Enrique Salem, group president, Consumer Business Unit, Symantec Corp. "Norton 360 was created with these activities in mind. It not only protects against traditional online threats, but it also helps secure users' identity when transacting online and safeguards valuable files like music and photos." "Wit

  • The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies 23 Feb. 2007 Vitaly Popovich

    Stuart Schechter (MIT Lincoln Laboratory) , Rachna Dhamija (Harvard University & CommerceNet), Andy Ozment (MIT Lincoln Laboratory & University of Cambridge), Ian Fischer (Harvard University) published an interesting report on security. They evaluated "website authentication measures that are designed to protect users from man-in-the-middle, "phishing", and other site forgery attacks." I think this report shows pretty well that quite frequently people are the weakest part of security systems. You can read about the report here: http://usablesecurity.org/emperor/ The whole report: http://usablesecurity.org/emperor/emperor.pdf

  • Microsoft Recognizes Most Valuable Professionals at 2007 MVP Global Summit 22 Feb. 2007 Vitaly Popovich

    REDMOND, Wash. - Feb. 22, 2007 - In the wake of the largest product launch in the company's history, that of the Windows Vista™ operating system, the 2007 Microsoft® Office system and Exchange Server 2007, Microsoft Corp. will host the 2007 MVP Global Summit. The annual event recognizes the value that Microsoft-designated Most Valuable Professionals (MVPs) around the world provide in helping to make the company's products successful, while honoring their contributions to the objective exchange of knowledge and their dedication to enriching the technology user experience. MVPs are individuals recognized by Microsoft as outstanding leaders in the technical community who make an exceptional impact on the IT industry by actively and voluntarily sharing their expertise in technical communities worldwide. Recent examples of the MVP influence on Microsoft's products and technology users include the following: • More than 2,000 MVPs participated in the Windows Vista beta program. • On average, a newsgroup posting by an MVP receives more than 43,000 views. • In 2006, the MVP community contributed more than 300 Microsoft Knowledge Base articles in seven languages covering all Microsoft products. "Every year, the MVP Award program continues to evolve to reflect the diversity in today's technical communities," said Sean O'Driscoll, general manager of Community Support and MVP at Microsoft. "This year is no different. The MVPs serve as an inspiration, sharing their expertise and passion for technology communities with an unyielding drive to help others." Scheduled for March 12 to 15, the 2007 MVP Global Summit will be held at the Washington State Convention and Trade Center in Seattle and at Microsoft's headquarters in Redmond, Wash. The event will kick off with a keynote address by Microsoft Chairman Bill Gates. More information can be found at http://mvp.support.microsoft.com/MVPsummit. About the Microsoft MVP Program Microsoft began the MVP Awards in 1993 as

  • Microsoft Network Monitor 3 22 Feb. 2007 Vitaly Popovich

    Overview Network Monitor 3.0 is a protocol analyzer. It allows you to capture network traffic, view and analyze it. This version is a complete overhaul of the previous Network Monitor 2.x version. Network Monitor 3.0 can co-exist with older versions of Network Monitor. NM3 installs in %program files%\Microsoft Network Monitor 3.0, so there is no conflict.For Vista, we have a new driver that supports new features available in the NDIS 6.0 driver. If you are using tools that rely on Network Monitor 2.x NPPTools, these tools will no longer work.Capturing on Vista requires NM3, as Netmon2.x does not capture properly on Vista.If during installation, you opt to use Microsoft Update to receive critical updates, then the installer will configure your system to receive these updates. If this configuration fails (because, for example, your Automatic Update settings are managed by a network administrator), the installation will continue without informing you. To ensure you have successfully signed up for Microsoft update, go to http://update.microsoft.com/microsoftupdate. If the configuration was successful, the site will provide information about available updates. If not, the site allows you to sign up for Microsoft Update directly.Warning: Capturing with the NM3 GUI with conversations enabled can use up considerable amount of memory. This may cause a machine to become unresponsive. If you need to capture data for long periods of time, please use the included command line utility, NMCap, and the /DisableConversations switch. 64 bit version: http://download.microsoft.com/download/e/6/3/e6328cf5-6f26-459b-8ec9-2985288d7166/nmsetup(x64).msi 32 bit version: http://download.microsoft.com/download/e/6/3/e6328cf5-6f26-459b-8ec9-2985288d7166/nmsetup(x86).msi

Show More