Daily News: AM
Network World Daily News: AM, 11/02/07 DARPA looks to adaptive battlefield wireless nets A new Department of Defense project is trying to use cutting-edge wireless research to create a tactical radio net that can adapt to keep soldiers linked with each other on the battlefield. Gitmo gets high-bandwidth makeover The U.S. Naval base at Guantanamo Bay, Cuba, notorious as the prison for enemy combatants, poses a lot of other thorny problems, including a copper communications infrastructure extremely unfriendly to high-speed networking. IBM to spend $1.5 billion to improve computer security IBM will spend $1.5 billion developing computer security products in 2008, a sum that could double the company’s previous spending. Did you know that 90% of IT managers are not prepared for a DNS Attack Dont be one of them...Check your DNS health today. Run a DNSreport and look like a hero. Make your life easier and make your company more secure. 56 critical tests against your domain in 8 seconds. Dont live without it. Visit today to learn more! | | Cisco to buy policy management vendor for $100 million Cisco this week announced an agreement to acquire Securent, a provider of policy management software for enterprises, for $100 million. Securent is privately held and based in Mountain View, Calif. The company’s distributed policy platform lets enterprises administer, enforce, and audit access to data, communications, and applications in heterogeneous IT application environments, Cisco says. Cyber jihad set for Nov. 11 Security experts are saying that a reported al-Qaeda cyber jihad attack planned against Western institutions should be treated with skepticism. A second life for 'Second Life' with open source? In the aftermath of the hype over the virtual world, a tiny group of developers presses on with building its Linux presence. Plus: Sun building collaborative, virtual world for teleworkers The 10 biggest Web annoyances In its relatively short life, the World Wide Web has already made many of our most mundane, tedious tasks quicker and easier to perform. But there are still a surprising number of activities -- from helping us buy concert tickets to protecting our privacy -- that, for one reason or another, the Web still can't get right, stirring the ire of even the most patient users. We look at 10 of the worst of them. Spammers employ stripper to crack CAPTCHAs Spammers are using a virtual stripper as bait to dupe people into helping criminals crack codes they need to send more spam or boost the rankings of parasitic Web sites, security researchers said Tuesday. Wireless slowly dies after Leopard upgrade, users report Mac users are reporting a number of problems with their wireless connections after updating to Leopard. Plus: Licensing change opens Apple Leopard Server to virtualization PODCAST Apple's not all lollipops and puppy dogs Keith and Jason discuss Google opening up its social network, the fast-selling Apple Leopard OS, and the biggest pet peeves they have about co-workers' office habits. LIVE CHAT All about IP routing with Jeff Doyle Got questions about IP routing, Internet scaling, NSF, NSR, IPv6, OSPF and BPG? Author and routing expert Jeff Doyle, celebrity blogger for Cisco Subnet, will answer all your questions on networking, routing and anything else you want to ask in a live chat on Wed. Nov. 7 from 2 p.m. - 3 p.m. EST. BLOGS Bot-herders for Ron Paul? Not exactly the kind of "support" Paul - or any presidential candidate - would like to have. Buzzblog: Blog readers make lousy editors Don't worry about blogging without your posts first being read by an editor, they told me -- they being experienced journalist/bloggers -- because the readers will always have your back; the readers, they said, will be your de facto editors. Well, almost two years into this venture I am here to tell you that those assurances have proven valid ... once in awhile. (This post has a poll, too.) Today on Layer 8, where we are big on anything that helps emergency workers: Researchers at Princeton are building security features directly into the hardware of personal computers, cell phones or PDAs, with the goal of building a computer architecture that enables the secure transmission of crucial rescue information to first responders during events such as natural disasters, fires or terrorist attacks. Today on Microsoft Subnet Win one of 15 copies of SQL Server 2005 Maintenance Practices, and check out the authors blogs. Read Chris Amaris's blog here and catch up with Ross Mistry and his blog here. Plus, training that won't waste your money, part II; and Michael Dortch ponders the (too) many faces of Microsoft. Today on Cisco Subnet Win a free Cisco training course worth $3,495; win the book 'MPLS VPN Security. Plus, Is Vyatta's less than $100 per GB of memory advantageous over Cisco's sometimes $5,000 per GB of memory?. |
No comments:
Post a Comment