To: PJ Strifas who wrote (26409 ) 4/1/1999 4:26:00 PM From: Rusty Johnson Respond to of 42771
NetWare Prepares For Intel's IA-64 New York Times Technology Filed at 2:22 p.m. EST By Guy Middleton and John Dunn for Network Week, CMPnet Novell last week gave the first proof-of-concept demonstration of the Modesto version of NetWare for Intel's IA-64 processor, and unveiled 6-pack, a multiprocessor version of NetWare 5. Modesto would be ready to ship when the first IA-64 systems launched, the company said. The announcements came at the end of the company's annual BrainSharedevelopers conference, and sounded an upbeat note in what has otherwise been a defensive year for the outfit. NetWare 5 6-pack was shown running on Compaq's new 8-way ProFusion server architecture. Refuting the idea that NetWare was no longer a priority for Novell, the company's chief scientist Drew Major said NetWare was on track to become the high-performance platform of choice for corporates. "We are different," he said. "Our protocol engine is the fastest in the world. NT and other systems require two or three times as much hardware [as NetWare]." Also announced was an initiative to provide users with a single all-purpose network identity. Novell previewed Digitalme, the latest attempt to extend the functionality of NDS, the company's core technology. Novell said it would use NDS to create a network identity controlled by users. "Digitalme is a technology that allows users to store their information in the directory on the Internet and gives them tools on the workstation for them to control what others see and who uses their information," said NDS product manager Derek Venter. "In the network, you have an identity you control." Novell said Digitalme would combine identity "objects" using NDS, enabling both corporate users and consumers to manage their identities and personal information securely on the Net. "Digitalme turns the traditional management paradigm upside down by giving users the ability to administer their personal information," Novell said. "Since the user controls what information they share, they know when and by whom their identity information is being used."