Interop Winners: Desktop Conferencing, Deep Security
It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.
Most interesting technology: Desktop videoconferencing system from Avistar Communications Corp. that can be delivered on a hosted or licensed basis, and integrates with major desktop applications such as IM to include a critical presence element. Want to initiate a video call? Connect with your coworker or partner in IM, and kick things off. The video quality is excellent, and the system integrates with room-based systems for those companies that have a huge investment in old-line VC technology that may be underutilized. Avistar's system makes videoconferences more accessible to a larger number of employees and desktops within a big company. Avistar touts major financial firms as multi-thousand-seat customers. Avistar President Simon Moss estimates Avistar's network and systems will carry 50 million minutes of usage this year and an expectation of 90 million minutes in 2008.
Most desperately needed technology: The list of data loss/data breach incidents grows every week. Now there are claims that the granddaddy of them all, TJX, is twice as large as the company has been reporting, with 94 million affected accounts. Stepping up to the plate with security technology that locks down laptops, mobile phones and more is a company called Mobile Armor that's making inroads into US military and other government agencies. Its products range from a Policy Server to set and enforce security policies, to tools to encrypt files and folders on removable media devices, to software for pre-boot authentication and full disk encryption on laptops. The company has unique insights into the most intensive data protection requirements. Director of technical services Matt Brickey related the story of certain military applications in Iraq where three failed password attempts will result in a laptop's hard drive being erased. Which leads me to the...
Most startling stat I heard: One New York-based financial services firm loses one laptop per day and five smartphones per day in taxicabs, says John Pironti, chief information risk strategist for the consulting firm Getronics. A common outcome: The cab companies sell off the gear after 30 days. How that's for risky business?
The European Union hopes that its proposed blue-card program will provide a more attractive alternative to the U.S. green-card program, which critics say is plagued by backlogs, cumbersome processes, and insufficient quotas.
Virtualization At The Desktop?
Examine how more than 250 companies plan to adopt server virtualization technology in this recent InformationWeek Research report, Server Virtualization.
The BI Explosion
Examine the business intelligence strategies of 500 companies, including deployment drivers and challenges, spending plans, and vendor selection, in this recent InformationWeek Research report.
Sure, Apple's 'Leopard' Is Overhyped -- But Here's Why It Matters Anyway
The Apple community is giving Leopard the lite version of the hype orgy that the iPhone received four months ago. All this for a mere software dot-release. It's easy for a sensible person to dismiss the whole thing as flummery, but in fact there are some meaty new benefits to Leopard that are worth looking forward to.
Photoshop For Linux? Don't Hold Your Breath
There's a few applications that would help make Linux more of a mainstream OS, but don't expect to see them ported to Linux anytime soon. One of the least discussed in this fashion? Adobe Photoshop.
Can Microsoft Catch Its Cool?
In a recent series of popular video ads, Apple portrayed itself as a young, hip guy challenging Microsoft's stodgy businessman. While that was an obvious marketing ploy, it is true that Apple (and Linux) users are often thought of as cooler than those who employ Microsoft Windows. How come?
Get Better Results from your IT investments In today's environment, you need to get the most out of your assets and people - all the while serving the strategic needs of your business and dealing with growth and acquisition issues. In addition, it is critically important to quantify results of those investments for leadership and accurately track service level agreements.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: InfoWeek@update.informationweek.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2007 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.