Monday, May 24, 2010

I could license you to use this software, but then I’d have to kill you

Skype's 'success' speaks volumes | What Do Angels Look For?

Network World Voices of Networking

Forward this to a Friend >>>


I could license you to use this software, but then I'd have to kill you
If open source struck you as strange when you first heard of the concept, you don't know the half of it. Developers, exercising their legal right specify their own licensing terms, have come up with some pretty wacky stuff. Fact or fiction? Some software is only legal to use after you are dead. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

WHITE PAPER: MegaPath

Top Considerations in Choosing a VoIP Provider
When SMBs are looking for new ways to reduce telecom costs, why are more of them turning to voice over IP? Get best practices advice for transitioning first to VoIP, and then fully converged services. Read More

Skype's 'success' speaks volumes
By many measures Skype has been a remarkable success, primary among them (for me) that the videoconferencing it enables has managed to virtually reunite my sister in Minnesota with her family in Massachusetts. Read More

What Do Angels Look For?
What makes a startup appealing to an angel investor? Read More


WHITE PAPER: IBM

IBM Analytics Solutions
Business leaders today are making decisions with major blind spots. But with advanced analytics, you can become a smarter, more fact-based enterprise. Read this white paper to see how IBM Analytics Solutions can help you gain a competitive advantage by enabling real-time or near-real-time decisions. Read More

FCC's 'third way': Trying to be partially pregnant?
In the aftermath of an all-too-predictable appeals court decision overturning the FCC's Comcast ruling, a majority of FCC commissioners announced that they have discovered a new path to the land of net neutrality. Also predictably, most of the usual network neutrality opponents have gone into a full-bore tizzy -- and, as is normally the case with full-bore tizzy, accuracy has been a casualty. Read More

My first month using the iPad for business: it's still lacking
I have been using my new iPad as a business tool since Interop. While it has been good in some areas, it has also been annoying in others. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Just How Many Radios Do You Need, Anyway?
I recently attended an IEEE Communications Society event that focused on ZigBee, a very interesting set of radios and protocols mostly designed for telemetry and control applications. And during the entire presentation, my mind wandered back to a fundamental question - how many radios do we really need in a handset? Read More

Pondering Oracle's virtual box of mystery
Much speculation and discussion has surfaced since Oracle announced its Red Hat-derived Enterprise Linux distribution in late 2006. Oracle has stated that OEL is not a fork of RHEL since the beginning, and so far this commitment has held true. Read More

Lying, meeting and traveling
Mark Gibbs ponders moral disengagement in e-mail, the value of face-to-face meetings, wonders why you don't use video conferencing more, and asks you to defend business travel. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Steve Jobs: Unimpressed with Google open source video codec
  2. Just when you thought the iPad couldn't be more popular
  3. Google says Google TV coming this fall
  4. Wal-Mart pushing for chip-and-pin payment cards in U.S.
  5. Black duck eggs and other secrets of Chinese hackers
  6. Cisco makes another optical acquisition
  7. I could license you to use this software, but then I'd have to kill you
  8. FTC takes out notorious porn- and botnet-spewing ISP
  9. Just how many radios do you need, anyway?
  10. Google rolls out Android OS upgrade

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment