Monday, October 05, 2009

Google needs method to answer Android questions; Social networking: too much of a good thing

Social networking: too much of a good thing; Network neutrality: Doing the right things
Network World logo

Voices of Networking

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Fortinet
rule

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.

Register now.

rule

Spotlight Story
Google needs method to answer Android questions

Long-time readers of this column will know that one of my big gripes with the Android project is communication, or the lack thereof. I have not complained as much about that recently because, in some areas, things are steadily improving. Getting technical answers, in particular, is working out about as well as can reasonably be expected, particularly given the growing size of the Android developer... Read full story

Related News:

Social networking: too much of a good thing
The potential of social networking web sites is truly awesome. Venues such as Facebook, MySpace, and Twitter (and dozens more), allow us to connect with, and form, social units for all manner of activities. Keeping in touch with friends and colleagues has never been easier, and people are taking advantage of these new tools to organize everything from hikes and art discussions to wholesale political...

Network neutrality: Doing the right things
Gibbs argues that the Internet is bigger than business and therefore needs to be seen as a core issue to our culture which means that network neutrality is needed if we are to collectively prosper.

National Cybersecurity Awareness Month Must Become More than a PR Event
Yesterday, I attended an industry event in Washington to kickoff October as National Cybersecurity Awareness Month. The event was sponsored by the National Cybersecurity Alliance and featured prominent speakers including Department of Homeland Security Secretary Janet Napolitano, Deputy Defense Secretary William Lynn, and the White House National Security Staff's Acting Senior Director for Cybersecurity,...

Microsoft: You Won't Sell More Windows Licenses By Not Making Microsoft Security Essentials Free To Everyone
I have a lot of good things to say about my experiences using Microsoft Security Essentials. You know Microsoft's doing something right when Symantec and McAfee start slinging FUD, whining about MSE being warmed over OneCare (and, I liked OneCare btw). But Microsoft most definitely stumbled in one very important aspect of Microsoft Security Essentials: it suffers from the "it's free but..." syndrome....

Why aren't more people using Cisco's IP SLA?
Cisco IP SLA has been embedded in most Cisco switches and routers for the past decade. Many network admins and managers are aware of it, but may find it difficult or impossible to use. The below Q & A with Josh Stephens - VP and Head Geek of network management software vendor - SolarWinds, talks about Cisco's IP SLA and new software that according to Solarwinds makes IP SLA easy to use: 1....

CCNA Security Part 1: What's on the Test?
I had this grand vision of a nice morning at the book store. Three books stacked on the table next to the easy chair, cup of coffee in hand. The books: The CCNA Security ECG (Exam Cert Guide), The Cisco Press CCNA Voice ECG, and the CCNA Wireless ECG. The goal: figure out what was on each exam, and then blog about it over the coming weeks.

Cisco pulls rug out from under RADVISION with Tandberg buy
Partners big and small need to be wary of Cisco, it seems. First, it bit the hand of resellers HP and IBM by developing its own blade servers for the data center. These companies accounted for roughly $2 billion in Cisco sales annually.

iSCSI is a growth strategy
Use of iSCSI is associated with aggressive IT strategies -- and also with smaller companies, which deploy it to far larger percentages of their server plant than larger companies. This makes sense, as iSCSI is typically a lower-overhead investment, and because larger companies with money sunk into Fibre Channel networks (and FC staff expertise) want to get maximum return on that investment.

In the cloud, watch out for deceptive service-level agreements
There are many things to consider before moving a business application to the cloud, and the service-level agreement offered by the vendor is among the most important. A vendor might promise five nines of availability – but that's no consolation if there are no meaningful service credits or an easy way to collect them.

Princeton's Wayback Machine helps break Vanish security system for self-destructing data
Researchers this week published a paper describing how they broke Vanish, a secure communications system prototype out of the University of Washington that generated lots of buzz when introduced over the summer for its ability to make data self-destruct.

FBI warns of social networking fraud, malware escalation
Fraudsters are targeting social networking sites with increased frequency and users need to take precautions, the FBI warned. 

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

4G Ahead! A new world of enterprise mobile broadband
This white paper defines 4G, examines the two leading 4G technologies, and discusses their various features, benefits and the progress of each technology to date. It concludes with a recommendation for companies considering future 4G deployments, and iPass' position.
Click here for all the details.


 

October 05, 2009

MOST-READ STORIES

  1. Ig Nobels honor Tequila diamonds, bra that converts to gas mask
  2. Cisco's struggle to move TelePresence down market prompts buyout
  3. FBI warns of social networking fraud, malware escalation
  4. Cisco to buy videoconferencing vendor Tandberg for $3B
  5. U.S. Homeland Security wants to hire 1,000 cybersecurity experts
  6. Microsoft defends its antimalware software after Symantec piles on
  7. The dark side of DLP
  8. Microsoft turning configuration management "on its side"
  9. Facebook CAPTCHA no match for spyware attack
  10. Obama bars fed workers from texting and driving

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: