Monday, November 12, 2007

Google's software erector set; VoIP security industry: Guilty as charged

Network World

Voices of Networking




Voices of Networking, 11/12/07

By Jeff Caruso

Bradner: The gPhone: Google’s software erector set, 11/06/07: After a frenzied build-up, Google did not announce the gPhone. Instead, the company announced there might be a gPhone in your future.

Jericho Forum: VoIP security industry: Guilty as charged, 11/05/07: A critique of VoIP security, plus 10 nasty questions to ask your VoIP supplier, from the chief information security officer of a global chemicals company and member of the Jericho Forum board.

Tolly: Apple’s Leopard backup breakthrough, 11/06/07: A string of columns could be filled writing about the many interesting features of Apple's OS X 10.5. To my mind, its integrated, automatic backup - Time ...

All VoIP Security. All in One Place.

From buying tips to peer discussions. From case studies to market trends. Network World's newly enhanced VoIP Security Buyer's Guide has everything you need to stay current, research technology, compare products and implement solutions - all in one convenient location.

Click here to go to the Buyer's Guide now.

Dzubeck: Turning the data center green, 11/06/07: With all the fanfare for Al Gore, one would think that global environmental concerns rank No. 1 on the list of "corporate social responsibility." Unfortunately, economics and internal operations have often overridden environmental concerns in the past ...

'Net Buzz: Blog readers make lousy editors, 11/05/07: Before plopping my behind on the blog bandwagon in January 2006, I would ask other journalist/bloggers how it was that posts could go from a blogger's fingertips to a reader's eyes without so much as passing within sniffing distance of an editor's ...

CDW: Unchain your computing power: Develop a wireless network plan, 11/05/07: Computers empower today’s employees to do things that no individual could have accomplished a generation ago, but desktop technology does tend to chain workers to their desks. Small businesses are discovering that providing employees with mobile ...

Antonopoulos: Encryption is the name of the game, 11/06/07: Up to now we’ve used encryption to protect against criminal elements, but what about using it to protect our data from service providers?

Nutter's Help Desk: Remote database connectivity across a WAN, 11/05/07: We have a small office that runs on Citrix connected to our HQ via a Megastream service (1Mb) connection. The remote office needs to connect to a database that contains a 16-Gb database. My problem is this remote office has grown and the 1Mb service ...

Backspin: Behavioral advertising isn’t the big problem, consumer tracking is, 11/02/07: A coalition of privacy activists wants the FTC to do something about tracking consumer online activity, but that’s just the tip of the iceburg.

Gaskin: Vulnerability assessment, 11/01/07: Hackers attack systems by throwing their bag of tricks at a network device and sneaking in through any cracks they find. But they don't just attack computers any more; they're targeting anything with an IP address, such as routers, printers, network- ...

Dr. Internet: Working with Office 2007 files in Office 2003, 10/31/07: I use Office 2003 and am having trouble with attachments people send me that were created in Office 2007. Is there a way I can read the Office 2007 files with Office 2003?

Gearhead: A possible DPC cause and a couple of cool PPC apps, 10/31/07: Gibbs considers a reader suggestion regarding DPC problems, and looks for the perfect clock utility for his iPaq running Microsoft’s Pocket PC and finds it and a backup program as well.

Cool Tools: Bluetooth headset is easy to wear and keeps the noise down, 10/31/07: A lot of Bluetooth headsets I've worn over the years have been heavy, bulky or just plain uncomfortable. I expected the same discomfort on the Voyager 520 so was very pleased when I put this on and didn't feel any need to take the device off. I used ...

MOST-READ STORIES:
1. MIT's amazing, foldable, stackable car
2. 5 cool wireless research projects
3. Networking's 50 greatest arguments
4. IPv6: Will matter to enterprises in five years
5. Antispam group targets transactions
6. 10 career killers to avoid
7. Major Russian crime hub suddenly dies
8. 10 questions about Microsoft Office 2007
9. Sprint, Clearwire kill joint WiMAX project
10. Hackers target Alicia Keys MySpace page

FEATURED BUYER'S GUIDE:
Unified Threat Management


Contact the author:

Jeff Caruso is site editor at Network World. Contact him.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment