Monday, April 20, 2009

The Internet Kill Switch; Third annual scare story about the national power system

Can the status quo threaten your LAN? Managing mobility requires casting a wide net
Network World logo

Voices of Networking

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by Dell
rule

Virtualized Storage & Windows Server 2008
Storage virtualization is nothing new, but what is new and exciting with regard to storage virtualization and Windows Server(R) 2008? In this podcast, Dell's Stan Stevens explains the core benefits that organizations can get from storage virtualization, as well as the skill set required to take advantage of virtualization features.

rule

Spotlight Story
The Internet Kill Switch

Mark Gibbs By Mark Gibbs
There are some ideas about technology that are simply bad thinking. Sen. Rockefeller's proposal to give the president an Internet Kill Switch is monumentally wrong headed. Read full story

Related News:

Bradner: Third annual scare story about the national power system
As far as the headline writers at the Wall Street Journal were concerned the battle was over and the U.S. electricity grid was under control by the enemy -- "Electricity Grid in U.S. Penetrated by Spies." There has been a bunch of speculation on the Web and in the blogosphere over just why this story came out when it did - this sort of thing is a fertile area for conspiracy theorists. But I'm more interested in the underlying issue and why it's not actually getting the attention it should.

Johnson: Managing mobility requires casting a wide net
Mobility represents one of the fastest-growing line items in most IT budgets as an increasing number of employees request and receive mobile services. Yet most companies don't even have a mobility strategy: Only 40% of the IT pros I work with have deployed one (though another 40% say they're developing one).

Antonopoulos: UC security: When the shoe doesn't fit -- compress the foot
If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications? This is a pattern that keeps repeating in many different ...

Insider Threat: Can the status quo threaten your LAN?
In times of economic crisis people tend to seek the safety and security of the status quo. "Doing what you've always done, and what everyone else is doing, is the most prudent course," goes the thinking.

Gearhead: Analyzing Twitter with Excel, Part 2
After looking at the update of a product that Mark Gibbs was, to put it mildly, rather critical of, he continues his self-appointed task of using Excel to analyze Twitter data.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Dell
rule

Virtualized Storage & Windows Server 2008
Storage virtualization is nothing new, but what is new and exciting with regard to storage virtualization and Windows Server(R) 2008? In this podcast, Dell's Stan Stevens explains the core benefits that organizations can get from storage virtualization, as well as the skill set required to take advantage of virtualization features.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/20/09

Today's most-read stories:

  1. Microsoft discloses ambitious security strategy
  2. Cisco reveals aggressive pricing for blade server system
  3. PBX killer, Voice CAL coming to OCS in 2010
  4. Black Hat 'supertalk' halted due to vendor concerns
  5. Why is Google's Schmidt still on Apple's board?
  6. Forced week off at Adobe not exactly a vacation
  7. Cisco against Buy America provisions of broadband stimulus fund
  8. Breakthrough enables Terabit Ethernet
  9. Microsoft's cloud identity platform on track
  10. H1-B demand falls sharply
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news




IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: