Monday, June 08, 2009

Cybersecurity: What will the attention span be this time?

Voices of Networking - Newsletter - NetworkWorld.com
4 key points on broadband stimulus money; What the Wireless Venture Capitalists Like
Network World logo

Voices of Networking

NetworkWorld.com | Update Your Profile


Sponsored by APC
rule

Executive Guide: Next Gen Data Center
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.

rule

Spotlight Story
Cybersecurity: What will the attention span be this time?

The idea that the White House would be interested in cybersecurity is not new. At least since former President Bush appointed Richard Clarke as National Coordinator for Security, Infrastructure Protection and Counterterrorism there has been some level of attention to this topic. But this attention has seemed to fade quite quickly after someone is appointed to a high-level cybersecurity czar-like role. Most people who have taken on that role have quickly quit in frustration. Read full story

Related News:

GM to Cisco: A momentous passing of the torch
It's official: General Motors is off the Dow, and Cisco Systems takes its place. The transition is more than just a dry Wall Street accounting maneuver: From a cultural, economic, and societal perspective, it marks a seismic shift in how our world is organized.

4 key points on broadband stimulus money
In her research note this week, Boston based Avian Securities Senior Telecom Research Analyst - Catharine Trebnick, gave an update on the broadband initiatives of the American Recovery and Reinvestment Act (ARRA).

What the Wireless Venture Capitalists Like
New investment in technology is reportedly down this year, like everything else, but venture capitalists (VCs) are still plowing cash into wireless and mobile.

Too Many IOS Versions, Something's Gotta Give Soon
Back when I worked in network operations at AT&T, I was (strangely) proud that I knew all the different versions, feature sets, and varieties of Cisco IOS. It was one of the things I could use quickly when dealing with bugs and outages. However, now, all the different versions of IOS are making me sick. Especially now being a manager having to deal with all of them. Let's take a short stroll down IOS lane... Best I can tell there are nine varieties of IOS: Regular IOS - the old warhorse running the routers.

Cell phones! $#!&!
Gibbs continues his rant about cell phone service providers and customer disservice and wonders how we can afford to let what are critical communications be run by what is effectively a cartel that just wants to squeeze us for every last cent it can while providing, at best, mediocre service? Altogether now: "I'm mad as hell …"

Will The Cloud Manage To Persist? Lessons From Operating In The Cloud
It's been an interesting learning experience using Amazon's EC2 computing cloud.

Building an RSS podcast feed, Part 1
Gibbs explores the details of creating an RSS (Really Simple Syndication) feed for a podcast.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Windows 7 + Windows Server 2008
Evolution of EthernetWe found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Apple iPhoneys: The 4G editionHere are nine management apps that won't break the bank.

The Virtual Environment: Improve Performance, Manage Complexity
Managing virtual machines can be surprisingly difficult for many businesses, resulting in time lost, project delays, performance issues, and lack of insight. This guide provides a brief overview of the management challenges you may experience when implementing virtualization, and explores solutions for ensuring that the virtual environment is always secure, fast, and available.
Learn more.


 

June 08, 2009

TOP STORIES | MOST DUGG STORIES

  1. So you think you know Apple?
  2. 40,000-plus Web sites infected in 'Beladen' Web attacks
  3. Cybercriminals refine data-sniffing software for ATM fraud
  4. Hospital turns away ambulances because EHR system goes down
  5. The world's weirdest mice
  6. Windows 7 to ship Oct. 22
  7. Five things we love/hate about Win 7/Windows Server 2008 R2
  8. Cisco adds rack server to data center computing system
  9. Data center network brawl
  10. Nine management apps that won't bust your budget

Take a Holistic Approach to Business Security
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs, and see how IBM enterprise security can optimize business results.
Learn More



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment