Monday, October 19, 2009

Ethernet everywhere! Mozilla blocks Microsoft's sneaky Firefox plugin

Mozilla blocks Microsoft's sneaky Firefox plugin; IBM plans big hardware upgrade next year
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by BoxTone
rule

5-Steps For Lowering Mobile Employee TCO
The rise of employee-owned BlackBerry, iPhone and other smartphones has created significant IT management and compliance challenges. This report recommends a 5-Step Mobility Management approach used by IT execs at best-in-class companies to cut mobility TCO, reduce risk and increase productivity.

Learn more.

rule

Spotlight Story
Ethernet everywhere!

Few technologies in the world have proven to be as adaptable as Ethernet. Once a meek 3Mbps over shared coaxial cable technology used to connect printers and PCs, it has morphed to much higher speeds and is used to help run trains, planes and spaceships. Here's a look at some of Ethernet's cooler implementations. Read full story

Related News:

Mozilla blocks Microsoft's sneaky Firefox plugin
Mozilla late Friday blocked the Microsoft-made software that had put Firefox users at risk from attack.

IBM plans big hardware upgrade next year
IBM executives outlined the company's plans to unveil new hardware systems next year in discussions after announcing third quarter financial results.

IBM, Intel executives face insider trading charges
Executives from Intel Capital and IBM face insider trading charges after allegedly scheming to provide information that others used to reap millions of dollars in illegal profits, the U.S. Securities and Exchange Commission on Friday.

Asterisk teams with IBM for small business VoIP
Small businesses can buy Asterisk open source IP PBX software as an add-on to IBM's Smart Cube office-in-a-box package.

Google Chrome doesn't integrate with Windows 7
Google has scrubbed plans to fully integrate its Chrome web browser with Microsoft's new Windows 7 operating system.

Going Shopping? Cisco Could Be Watching You
Ahhhh, Physical Security! It usually constitutes one of the major weak links in IT security's armor. All you have to do is look at the demand for Network Access Control (NAC) to be convinced. Most don't realize that Cisco has been in the physical security business for a while now, mostly in the IP Video Surveillance (IPVS) sector.

Streaming My Hava Media Player to my iPhone via Verizon MiFi
Just a fun blog this week. I really love my iPhone 3GS. And I really love my Hava TV streaming appliance.

It's the OpEx, Stupid (and a couple of notable events)
As part of my presentation on the .11n road show that I'm now in the middle of, I'm talking about a key theme motivating advances in WLAN (and really, overall network) management - that an emphasis on what it costs to purchase and install a wireless LAN detracts from where the focus should really be, and that is on total cost of ownership (TCO).

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

The Dramatically Shifting Role of Network Management
The traditional approach to network management focused just on the availability of networks. While that is still important, today's network managers are also being held responsible for the performance of network and applications. Listen to a conversation between Jim Metzler and Stelio D'Alo that discusses the business, technology and management trends that are impacting your job.
View Now


Improving Application Performance Troubleshooting
Dramatically reduce downtime with the right tools. This whitepaper explains the four key features your application performance management toolset should include. Look for automation, intuitive analysis, real-time support and proactive problem solving.
Read More

 

October 19, 2009

MOST-READ STORIES

  1. How to royally foul-up an IT outsourcing project
  2. Husband, wife team arrested for allegedly stealing from Cisco
  3. Missing dot drops Sweden off the Internet
  4. 15 genius algorithms that aren't boring
  5. NASA network security torched
  6. The Internet has shifted under our feet
  7. 10 great Google Apps add-ons for the enterprise
  8. He knows .Net and SQL ... not missile launchers
  9. Microsoft apologizes, recovers most Sidekick data
  10. Facebook applications at risk from attack

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.
Building a Successful Security Operations Center



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment