Feeds

Novell puts Netware on life support until 2015

Open source and wireless star in Utah

Beginner's guide to SSL certificates

Novell will support Netware, the veteran, nay ancient, network operating system, until at least 2015. By which time, presumably everyone who ever used the system will be retired or dead.

Speaking yesterday at the company's annual Brainshare conference in Salt Lake City, Utah, Novell CEO Jack Messman said said the firm would support users of the latest (6.5) version of the network operating system software "as long as customers want to run it."

Netware users are not as plentiful as they once were, but they still represent an income stream of sorts for Novell. Which is just as well, as sales for its new flagship software, the SUSE Linux distro are not cutting much mustard, especially when compared with mighty Red Hat.

At BrainShare, yesterday Novell unwrapped SUSE Linux Enterprise 10. This is marketed as a platform for the open enterprise - features performance, security, virtualisation and management enhancements over previous versions of the software. It works with SUSE Linux Enterprise Desktop 10, Novell's recently announced desktop platform.

To enable organisations to consolidate multiple workloads on a single server, SUSE Linux Enterprise 10 comes integrated with Xen 3.0, an open source standard for virtualisation services. SUSE Linux Enterprise 10 also features Novell AppArmor, an application-level security service, as part of plans to thwart hacking attacks.

Elsewhere at Brainshare, Novell announcement improved integration between its GroupWise messaging platform and Blackberry wireless devices from RIM. Novell also unveiled a significant expansion of its partnership with Dell, with plans by the hardware manufacture to sell Novell ZENworks 7 Linux Management with Dell PowerEdge servers running Linux starting in April.

Also, Novell detailed plans to add enhancements to its security and identity management products focused on helping customers to automate user provisioning, simplify single sign-on and manage shared network resources. Implementing single sign-on technology means that users need only log on once to access multiple applications. The idea is to reduce password headaches and save money by reducing helpdesk calls from forgetful users. ®

Beginner's guide to SSL certificates

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.