Monday, April 13, 2009

Yet another government attempt at cybersecurity; Workplace surfing hounds have a new hero

Monkeying around with chi.mp; Of heroes and wonks in the IT ranks; One foot on the ground and one in the clouds
Network World logo

Voices of Networking

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by Avaya
rule

Masters of Unified Communications
This interactive microsite is updated daily by Johna Till Johnson of Nemertes Research with all of the latest news on Unified Communications. Explore this site now to read the latest news on UC and download relevant whitepapers, case studies, videos, and more.

rule

Spotlight Story
Yet another government attempt at cybersecurity

Scott Bradner By Scott Bradner
The timing of two cybersecurity bills just introduced by Sen. John D. Rockefeller, IV (D.-W.Va.), Sen. Olympia Snowe (R.-- Maine) and Sen. Bill Nelson (D.-Fla.) seems a bit funny. It is not so much that they were introduced on April Fools' Day; more importantly, they were introduced before the widespread review of U.S. cybersecurity ordered by President Obama is completed by Melissa Hathaway. Read full story

Related News:

'Net Buzz: Workplace surfing hounds have a new hero
Surfing the Internet for fun while at work actually increases employee productivity, insists Dr. Brent Coker, a researcher at the University of Melbourne's Department of Management and Shirking.

Cool Tools: Monkeying around with chi.mp
Like many social networks, a chi.mp account gives you your own "Web space", letting you post status updates and photos, and link to other social networks or Web feeds.

Johnson: Of heroes and wonks in the IT ranks
A few weeks back, one of my clients remarked that he architected his data center network so as to "avoid the need for heroes." His point was that if the network were sufficiently robust, there would be no need for 3 a.m ...

Gaskin: One foot on the ground and one in the clouds
The early adopter "cloud crowd" makes the most headlines, but they're only the tip of the small business iceberg. Looking at various data storage vendor customer numbers has convinced me 90% of small businesses are ...

Gearhead: Analyzing Twitter with Excel, Part 1
Mark Gibbs ponders how to analyze Twitter for a specific search term using the Twitter search API and Microsoft Excel.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Avaya
rule

Masters of Unified Communications
This interactive microsite is updated daily by Johna Till Johnson of Nemertes Research with all of the latest news on Unified Communications. Explore this site now to read the latest news on UC and download relevant whitepapers, case studies, videos, and more.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/13/09

Today's most-read stories:

  1. Fearing and loathing in Windows 7
  2. Conficker, the Internet's No.1 threat, gets an update
  3. Are you an IT geezer? (and we mean that in a good way)
  4. Microsoft eating up U.S. and global netbook markets
  5. Feds join Twitter revolution
  6. How serious is threat to power grid?
  7. Report: Nokia Siemens bids for much of Nortel
  8. 10 eye-catching gadgets at CTIA
  9. EMC, VMware promise major virtualization, storage upgrades
  10. Cisco to buy Tidal Software for $105 million
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Responsible for building a resilient data center

Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free: Visit http://www.nww.com/rpgx.jsp?c=XU1PHA1712Z4303.

IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: