Take a Close Look at Windows Server 2008

Total Page:16

File Type:pdf, Size:1020Kb

Take a Close Look at Windows Server 2008 0208red_Cover.v9 1/17/08 3:37 PM Page C1 Foley: Is Silverlight the White Elephant in the Room? 64 FEBRUARY 2008 REDMONDMAG.COM TakeTake aa CloseClose LookLook atat WindowsWindows ServerServer 20082008 Will it be your next-generation platform? 26 > $5.95 02 • FEBRUARY +Beta Man Looks at Microsoft Search Server 1212 Get Ready for SQL Server 2008 37 25274 867 27 71 Searching for Enterprise Search Engines 45 Project2 1/14/08 12:46 PM Page 1 UB_CatchPhrase_Redmond.ai 1/11/08 12:03:14 PM ™ Reliability — Catch phrase or reality? Hot backups. Business continuity. Continuous data protection. These and other buzzwords have been generated by the technology industry to get your attention. But what do these terms mean to you? To UltraBac Software, they are another way of explaining the goal at the center of our business: perfect uptime. We invest the time and resources to offer solutions that ensure you have the fastest, most reliable access to your stored data, avoiding costly downtime waiting for failed machines to recover. Introducing Continuous Image Protection (CIP). UltraBac Software is so excited about our new technology that aids in this goal, we’re announcing CIP before its planned release. CIP is a form of continuous data protection (CDP) with a new innovation: it automatically backs up each sector on a disk as it is changed, unlike standard image backups which run only on a periodic basis. With CIP, your image backup never stops – so a system can be brought back to a point-in-time, rather than restoring a static image that could be up to 23 hours old. UltraBac Software’s sole mission is data protection. So when we advertize product reliability, innovative features and functions, and top-notch support they are not simply catch phrases we use, but rather our commitment to you and your business. UltraBac – Innovative software from a reliable company. BACKUP AND DISASTER RECOVERY SOFTWARE FOR PEOPLE WHO MEAN BUSINESS WWW.ULTRABAC.COM © 2008 UltraBac Software. All rights reserved. UltraBac Software, UltraBac, UltraBac Software logo, UBDR Gold, UBDR Pro, Continuous Image Protection, and Backup and Disaster Recovery Software for People Who Mean Business are trademarks of UltraBac Software. Other product names mentioned herein may be trademarked and are property of their respective companies. 0208red_TOC1.v6 1/17/08 12:30 PM Page 1 2007 Winner for Best Single Issue Computers/Software, Training & Program Development/Trade Redmond FEBRUARY 2008 The Independent Voice of the Microsoft IT Community Contents COVER STORY REDMOND REPORT 9 Longhorn’s File Services Role Windows Formalizing a formerly Server 2008: subjective functionality. 10 Gates Begins His Long Goodbye Taking a Microsoft’s chairman wraps up the first Closer Look ‘digital decade’ with his last CES keynote. Virtualization and configurability in Microsoft’s new server OS present enterprise IT shops with both challenges and opportunities. 12 Beta Man Microsoft Search Server Page 26 2008 Express COLUMNS 4 Barney’s Rubble: FEATURES Page 45 Doug Barney 37 Laying the Groundwork: Dear Steve: Microsoft SQL Server 2008 Think Enterprise Redmond’s new database server is a complex product often running mission-critical apps. You can’t afford to not get it right. 45 Searching for an Answer in the Enterprise PHOTO BY IRA WYMAN As the clamor from IT shops for better internal search grows louder, competition among vendors both large and small gets hotter. REVIEWS 53 Mr. Roboto: Product Reviews Roundup Jeffery Hicks Get Answers to Your 15 Keep Your Disk 20 Build an IT Structure Storage Questions Drives Healthy for Compliance 55 Windows Insider: Diskeeper 2008 Pro Premier attacks a Any of these solutions can help Greg Shields hidden problem with a comprehensive ensure that you’re following A NAP Is Good for performance management solution. organizational policies or Your Health regulatory requirements. Reader Review 57 Security Advisor: 17 Windows Server 2008: Joern Wettern So Far, So Good Virtualization Done Differently Enhanced administration, security, IIS updates and virtualization promise 64 Foley on Microsoft: to make moving to Microsoft’s new Mary Jo Foley server OS worthwhile. The White Elephant in the Room? ALSO IN THIS ISSUE 2 Redmondmag.com | 6 [email protected] | 63 Ad and Editorial Indexes COVER ILLUSTRATION BY ROBERT KAYGANICH 0208red_OnlineTOC2.v5 1/17/08 9:30 AM Page 2 Redmondmag.comFEBRUARY 2008 VisualStudioMagazine.com Questions with ... Visual Studio 2008 Kicks Off Scott Bekker Scott Bekker is editor PHOTO BY KATHERINE LAMBERT PHOTO BY KATHERINE here’s so much new stuff in in chief of Redmond TVisual Studio 2008 that our Channel Partner. Read sister publication, Visual Studio RCP’s coverage of the Magazine, devoted an entire managed services issue to it. Find out about all the provider (MSP) market in new features in Visual Studio the February issue. 2008—plus what got left out—and read up on a primer on Visual Basic Scott Bekker 2008, the lowdown on bugs, what to expect in future versions and much, In a nutshell, what’s a much more. Read it all online now on VisualStudioMagazine.com. managed services provider? FindIT code: VSMVS2008 It’s a company that remotely monitors your infrastructure and keeps your servers running. ESJ.com While Microsoft partners might get the MSP concept, why should What’s in Store for customers care? On an MSP model you pay the same Storage in 2008 monthly fee whether the system is online or offline, with penalties to the hen it comes to storage in 2008, it’s the “beginning Jon Toigo MSP if a service level agreement isn’t Wof the end of Fibre Channel [FC],” according to met. To succeed, an MSP needs to ESJ.com columnist Jon William Toigo. keep your systems running. “Frankly, FC never delivered the goods,” he writes. “It didn’t provide the any-to-any connectivity between servers and storage that those who Is there a legitimate fear that MSPs thought up a SAN back in the late 1990s had promised. Pounding the nail in will replace IT services at some point? the coffin of FC was a survey conducted last year that showed that FC Theoretically, having an outsider fabrics were the third leading cause of IT downtime in companies.” handle infrastructure uptime lets IT Find out what Toigo thinks will replace FC, and learn about his other departments concentrate on storage predictions for 2008. FindIT code: ESJST2008 implementing new applications that are strategic to the business. REDMONDMAG.COM RESOURCES What are FindIT codes? Resources Enter FindIT Code Throughout Redmond, you’ll >> Daily News News discover some stories contain FindIT >> E-Mail Newsletters Newsletters codes. Key in those codes at >> Free PDFs and Webcasts TechLibrary Redmondmag.com to quickly >> Subscribe/Renew Subscribe access expanded content. FindIT >> Your Turn Editor Queries YourTurn codes are not case sensitive. Redmondmag.com • RCPmag.com • RedDevNews.com • VisualStudioMagazine.com MCPmag.com • CertCities.com • TCPmag.com • ENTmag.com • RedmondEvents.com • ADTmag.com • ESJ.com 2 | February 2008 | Redmond | Redmondmag.com | Project5 10/8/07 11:07 AM Page 1 :067&/&7&34&&/"3&1035%05)*4#&'03& %&':5)&-"840'3&1035*/( 1VUOFXQPXFSJOUIFIBOETPGCVTJOFTTVTFST &NQPXFSUIFNUPNBLFNVMUJQMFEFDJTJPOTGSPNPOF SFQPSU SVOUIFJSPXO²XIBUJG³TDFOBSJPTBOEHFUNPSF SFQPSUWJFXT JOTUBOUMZ4PZPVµSFGSFFGSPNXSJUJOH OVNFSPVTSFQPSUTBOEVQEBUFT±UBTLTUIBUDBOIBWF SFBMJNQBDUPOZPVSEFQBSUNFOUµTQSPEVDUJWJUZ 1VUOFXQPXFSJOZPVSPXOIBOET8SJUFSFQPSUTXJUI TUVOOJOHOFXWJTVBMTMJLFFNCFEEFEWJEFPBOE FOSJDIFEHSBQIJDT$SFBUFDPNQFMMJOHBOEFOHBHJOH JOUFSBDUJWFFYQFSJFODFTGSPNBOZEBUB BOZXIFSF %JTDPWFSUIFOFXMBXTPGSFQPSUJOHGSPN$SZTUBM3FQPSUT±UIFUSVTUFEJOEVTUSZTUBOEBSE 7JTJUCVTJOFTTPCKFDUTDPNEFGZUIFMBXTPSDBMM $PQZSJHIU#VTJOFTT0CKFDUT4""MMSJHIUTSFTFSWFE 0208red_Rubble4.v7 1/17/08 9:33 AM Page 4 Barney’sRubble by Doug Barney RedmondTHE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY REDMONDMAG.COM FEBRUARY 2008 ■ VOL. 14 ■ NO. 2 Editorial Staff Editor in Chief Doug Barney Dear Steve: Think Enterprise Editor Ed Scannell Executive Editor, Features Lafe Low Executive Editor, Reviews Peter Varhol Managing Editor Wendy Gonchar ’ve always thought open letters to major executives were Associate Managing Editor Katrina Carrasco Contributing Editors Mary Jo Foley Jeffery Hicks more pompous than a Dennis Miller monologue, but in Greg Shields Joern Wettern this case, it’s worth being a bit pretentious. So here it is: Art Staff I Art Director Brad Zerbel My first-ever open letter. Senior Graphic Designer Alan Tao Online/Digital Media Steve, your company is doing a remark- on Parallels and BootCamp for Windows Editor, Redmondmag.com Becky Nagel able job in digital music and mobile interoperability isn’t enough. You need to Executive Editor, New Media Michael Domingo Executive Editor, Web Initiatives Becky Nagel phones, and the Mac is doing swell in the improve native Mac OS interoperability. Online News Editor Keith Ward graphics and home markets. After seeing • Connect with Linux desktop ven- Associate Editor, Web Gladys Rama the death of OS/2, the Amiga, the Atari dors. Linux on the Mac, if heavily mar- Director, Web Development Rita Zurcher ST and a long line of wacky com- keted, would rally the geek troops. puters from Radio Shack/ • Get aggressive on pricing. Tandy, I’m stunned that your The cheapest MacBook is President Henry Allain Mac is even still alive. For the around $1,100, and its hard- Vice President, Publishing Matt N. Morollo record, I predicted the death of ware is the rough equivalent Vice President, Editorial Director Doug Barney Director, Marketing Michele Imgrund the Mac—one of many times of a $450 Dell. You shouldn’t Senior Marketing Manager Tracy S. Cook I’ve been more wrong than an have to be a brie-eating, Marketing Programs Manager Videssa Djucich intelligence report on Iraq. For Volvo-driving, Merlot-drinking that I apologize. yuppie to afford a Mac. With Apple’s image at an all- • Communicate with the time high (your stock IT press and IT customers. President & CEO Neal Vitale isn’t too shabby, Although skeptical, the CFO Richard Vitale either), it does seem IT press would love to Executive Vice President Michael J. Valenti Managing Director, Events Dick Blouin arrogant for me to hear from Apple.
Recommended publications
  • Solarblizzard
    Security Now! Transcript of Episode #800 Page 1 of 27 Transcript of Episode #800 SolarBlizzard Description: This week we open the New Year taking a longer look at fewer topics since the bad guys were apparently enjoying their New Year holiday, too. So we look at an interesting kludge that's been forced upon Chrome by ill-mannered antiviral scanners. We need to warn all enterprise users of Zyxel network border security products of another recently discovered built-in backdoor. We look at the rise in IoT compromise swatting attacks and a series of new flaws and vulnerabilities in the PHP Zend and Yii frameworks. We have a quick bit of miscellany to share, then I want to explain a lot about the value of trimming SSDs and newer SMR drives. And we'll conclude by catching up with what will hopefully be the last news, for a while at least, of the disastrous SolarWinds breach and intrusions. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-800.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-800-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here with a defunct football; a very bad AV security practice that Chrome has had to do something maybe even worse to fix. We'll talk about the built-in password access in 100,000 Zyxel firewalls, VPN gateways, and access point controllers; an update on SpinRite 6.1; and a whole lot more. Security Now! is coming up next.
    [Show full text]
  • Internet Safety: Keeping Your Computer Safe on the Internet
    Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Internet Safety Keeping your Computer Safe on the Internet 3rd Edition by Leo A. Notenboom http://ask-leo.com Copyright © 2011 Puget Sound Software, LLC & Leo A. Notenboom All rights reserved. ISBN: 978-1-937018-03-0 Copyright © 2003-2010 Puget Sound Software, LLC and Leo A. Notenboom 1 Copyright and Disclaimer This book is protected by US and International copyright law, and is Copyright © 2011 by Leo A. Notenboom and Puget Sound Software, LLC, all rights are reserved. Having said that, the PDF electronic version (only) of this book is FREE. In fact, I encourage you to share this book with others as long as you share it: In its entirety (the book, the whole book and nothing but the book) In its original form (no changes made and no markups added) You may not charge for this book when you share it. Furthermore, you may not incorporate this book into any product or collection that is not free. (Drop me a line for pricing if you want to do something along those lines.) This book is based on my experience and anecdotal evidence. I've tried to ensure that everything written here is as accurate as possible at the time of publication, but I cannot assume any responsibility for mistakes or omissions. On top of that, I know nothing about your specific computer, your specific experience and your specific abilities to understand and act appropriately on the information herein. The bottom line is that you, and only you, are responsible for using this information appropriately, safely and as you see fit, and for any of the consequences of having done so.
    [Show full text]
  • SQRL: Anti-Phishing & Revocation
    Security Now! Transcript of Episode #426 Page 1 of 30 Transcript of Episode #426 SQRL: Anti-Phishing & Revocation Description: After following-up on a week chockful of interesting security news, Steve and Leo continue with their discussion of SQRL, the Secure QR code Login system, to discuss two recent innovations in the system that bring additional valuable features. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-426.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-426-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson has the latest - yes, another Java patch - and more information about Lavabit. More information about the NSA, too. What is a Ferret's Cannon? It's coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 426, recorded October 16th, 2013: SQRL, Anti-Phishing, and Revocation. It's time for Security Now!, the show that covers your privacy and security online. Somebody in the chatroom before we began the show today, Steve Gibson, Explainer in Chief, said we should call it "Insecurity Now!" since it really talks mostly about insecure. But not today. Today we're going to talk about better security. Steve Gibson: Well, yeah. Actually, this is one of those episodes where so much happened in the last week in security news that, I mean, we just - there's a whole bunch of really interesting stuff to talk about. And in the past when we've done that we've just said, okay, we're not going to have any major topic because too much happened.
    [Show full text]
  • Podcast Industry Audience Rankings July 2016
    PODCAST INDUSTRY AUDIENCE RANKINGS JULY 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast ​ ​ industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry.
    [Show full text]
  • 700 & Counting
    Security Now! Transcript of Episode #700 Page 1 of 27 Transcript of Episode #700 700 & Counting Description: This week we discuss Chrome getting spell check for URLs; a bunch of Linux news with reasons to be sure you're patched up; some performance enhancements, updates, additions, and deletions from Chrome and Firefox; more Facebook nonsense; a bold move planned by the Japanese government; Ubiquiti routers again in trouble; a hopeful and welcome new initiative for the Chrome browser; a piece of errata; a quick SQRL update; and some follow-up thoughts about VPN connectivity. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-700.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-700-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. Lots to talk about, including new systemd vulnerabilities. Linux users, listen up. We'll also talk a little bit about Chrome, a new feature giving us URL spell checking, and why TLS 1.0 and 1.1 are soon to hit the highway. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 700, recorded Tuesday, February 5th, 2019: 700 & Counting. It's time for Security Now!, the show where we cover the latest developments in the world of security and privacy, help you understand how computing works, and have a little fun along the way with this guy right here, Steve Gibson. He's the commander in chief of the good ship Security Now!.
    [Show full text]
  • Ublock Origin
    Security Now! Transcript of Episode #523 Page 1 of 27 Transcript of Episode #523 uBlock Origin Description: Leo and I catch up with the week's major security events. We then examine the ecosystem of web page advertising by comparing it to other "opportunistic advertising" such as that appearing on public transportation, highway billboards, broadcast television commercials and other public venues - which consumers have no obligation to consume. I eschew the implication that visitors to a web page have an obligation to retrieve third-party content, over which the website has little or no control, which consumes bandwidth, reduces online privacy, hinders performance, and potentially exposes visitors to malicious exploitation. And I believe this remains true even when a visitor's retrieval of such despicable third-party content would generate much-needed revenue for the visited site. Finally, I review the many operational features of uBlock Origin, my chosen HTML firewall, which effectively returns control to web users. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-523.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-523-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson's here. This is the episode I've been waiting for all week. He's going to cover adblocking, why he thinks we need adblockers, and, I think, I'm guessing, his favorite ad blocker to date. Actually, I like it a lot, too. uBlock Origin, how it works, how to work it best, coming up next on Security Now!.
    [Show full text]
  • Security Now! #560 ­ 05­17­16 Z­Wave Goodbye
    Security Now! #560 ­ 05­17­16 Z­Wave Goodbye This week on Security Now! ● Steve's long love affair with Windows ● The Oracle/Google JAVA API lawsuit ● The pending registration of "burner" phones ● Surveillance microphones found in public areas ● John McAfee and team cracks WhatsApp encryption? ● The Ring Doorbell may need another update ● A security­related Kickstarter which Security Now listeners would never fall for. ● A controversial feature being removed from Windows 10 ● A worrisome and exploitable heap corruption in the popular 7­Zip application ● ... and a look at the Z­Wave Home Automation system What was last week’s 3035583 refresh all about? ​ ​ Security News “Why does Steve hate Windows 10 so much?” ● Let’s get this straight, everyone: I LOVE WINDOWS. Source: https://analytics.usa.gov/ ​ ● 83.60% = Win7/44.56% Win10/17.90% Win8.1/10.30% WinXP/7.46% Win8/3.38% ● My complaint is that Windows is a commercial, closed­source, profit center for a massive corporation which must keep finding ways to leverage Windows’ market share for its own ​ ​ profit. ● For me, Windows is not a curio, a toy, or a platform for instagram and social media. Windows is a tool. It is my chosen tool. But Microsoft needs to keep changing it, NOT ​ ​ TO MAKE IT BETTER, but only for the sake of making it new. ​ ​ ● So there is an inherent tension between Microsoft’s interests and my own. ● An operating system should manage file systems, manage the system’s memory, manage applications and services, provide I/O services… and more recently provide a comfortable and convenient desktop environment for its user.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]
  • Breaches & Vigilante Worms
    Security Now! Transcript of Episode #528 Page 1 of 30 Transcript of Episode #528 Breaches & Vigilante Worms Description: With many massive Internet data breaches, and a prolific vigilante worm loose on the Internet, Leo and I spend a fun- and fact-filled podcast covering the past week's multitude of news. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-528.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-528-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. My goodness, it's been a busy week. This is going to be an all-news episode. We'll talk about the vigilante worm. We'll talk about security breaches at some very well-known sites. And we'll also talk a little bit about updates that make Marshmallow, Android 6.0, more secure. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 528, recorded Tuesday, October 6th, 2015: Breaches & Vigilante Worms. It's time for Security Now!, the show in which we protect you and your family and your loved ones online. We scour the Earth for new vulnerabilities, attempt to plug the holes, and it's all thanks to this guy. Steve Gibson: Actually, they find us, Leo. We need not scour. And if I thought I ever had to before, Twitter has solved that problem for me. Leo: Yeah. Steve: It's just - it's such a fabulous resource. I've got, you know, as I mentioned before - actually, I don't think I did mention that I mentioned we were nearly at - I.
    [Show full text]
  • Podcast Industry Audience Rankings Expanded Advertiser Edition: June 2016
    PODCAST INDUSTRY AUDIENCE RANKINGS EXPANDED ADVERTISER EDITION: JUNE 2016 2 INTRODUCTION With the growing popularity of podcasts, more and more brands and agencies are exploring the medium in search of opportunities that make the most sense for their brands. And publishers are making important content decisions about ways to expand or better serve their audiences across multiple shows. What is the most accurate measure of podcast audience size? An obvious place for advertisers to begin exploring podcast advertising is with understanding the relative audience sizes of podcast publishers and of podcasts individually. Podtrac has provided the leading measurement service for podcasts since 2005. In 2016, Podtrac introduced “Monthly Unique Audience” for the podcast ​ ​ industry. It's the same metric used for planning other types of digital media, and for the first time it's available for podcasts from Podtrac. Monthly Unique Audience from Podtrac is available: ● By podcast publisher across all of the podcast shows and episodes they produce ● By show for all of the podcast episodes they produce ● By global and U.S. audience counts “Monthly Unique Audience” is an important metric in digital media because it enables advertisers and publishers to consider monthly audience reach in addition to potential impressions served. And as with other media, the monthly unique audience metrics from Podtrac are consistent across publishers and shows whether the episodes post daily, twice a week, weekly, etc. Which podcasts are audiences listening to most? Podtrac produces a monthly Ranking Report showing the top publishers in the industry by US audience. Podtrac is in a unique position to produce this report, because of its podcast measurement technology and its 10+ years of measurement relationships with substantially all of the top publishers in the industry.
    [Show full text]
  • The Dark Escrow
    Security Now! Transcript of Episode #820 Page 1 of 22 Transcript of Episode #820 The Dark Escrow Description: This week we examine Firefox's just-released and welcome re-architecture under codename "Fission." We look at a new and recently active ransomware player named "Conti" and at a recently paid, high-profile mega ransom. We then ask the question, "When they say IoT, do they mean us?" We examine the implications of a new industry term, "mean time to inventory." We'll then lighten things up a bit with a new form of CAPTCHA and, of all things, a screensaver I discovered that I cannot take my eyes off of. (Leo, it's not quite as bad as whatever that game is that you cannot stop playing, but still.) We'll then share an ample helping of closing-the-loop feedback from our terrific listeners, after which I want to conclude by predicting what I would bet we're probably going to next see emerge from the evolving ransomware business model sad though it is to utter the phrase "ransomware business model." High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-820.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-820-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got a great show for you. Brand new feature in Firefox. It's called Firefox Fission. Steve explains it and shows you how to turn it on. I did immediately. We'll also talk about a new form of CAPTCHA that involves playing Doom.
    [Show full text]
  • New Year's News Catch-Up
    Security Now! Transcript of Episode #437 Page 1 of 35 Transcript of Episode #437 New Year's News Catch-Up Description: This first podcast of 2014 catches us up on all of the news that transpired over the Christmas and New Year's holidays - and there was a LOT of it! (Like it or not, the NSA news just keeps on coming!) High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-437.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-437-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve is back. Our first show of the new year, what are we talking about: the NSA and the ANT protocols. Lots of security news. We'll catch up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 437, recorded January 7th, 2014: New Year's News Catch-Up. It's time for Security Now!, the show that covers your security and privacy online, your safety online, with the guy in charge, the "Explainer in Chief" we call him, Steve Gibson. Oh, my goodness, Happy New Year, Steve. Steve Gibson: Yes, indeed. And I was wearing my Explainer in Chief T-shirt for the day up there with you for... Leo: I loved that. Steve: I didn't make it 24 hours. Actually I had a lot of people asking me, "Where did you get that TNO T-shirt?" And it was from one of our listeners. I'm so sorry that I've, like, it was so long ago, it was a couple years ago, and I just kept the T-shirt for the right occasion.
    [Show full text]