Monday, June 06, 2011

Worst hackers ever?

My Fav Free Forensic Analysis Tools | Cisco resorting to intimidation tactics

Network World Voices of Networking

Forward this to a Friend >>>


Worst hackers ever?
We always hear about the big data breaches, the most devastating viruses, and the most denying of the denial-of-service attacks. But for every hacker with that level of deviousness, there are a thousand wannabes out there. Some get ridiculed, some get arrested. Here are a few favorites, as reported by the Internet. Read More


WEBCAST: Citrix Systems

How does your IT truly measure up to that of your peers?
IDG polled 350 global CIOs and IT leaders and developed a benchmark survey that you can take now. The report you'll receive afterward details just how your IT efforts in business-critical performance areas stack up against those of these leaders. Learn more here!

WHITE PAPER: Netezza, an IBM Company

Oracle Exadata and Netezza TwinFin™ Compared
This ebook will provide the fundamental differences between the Netezza TwinFin® and Oracle Exadata solutions from the perspectives of query performance, simplicity of operation and value. The ebook will help you determine which solutions best meet your business needs and how to achieve optimal results from your data. Read now

My Fav Free Forensic Analysis Tools
I believe that if someone is just getting into IT and they want a solid career path, it's hard to beat forensic science or data center engineering. Now some of the tools out there in forensics are VERY expensive due to their incredible speed and "court room" validation. However, if you just want to mess around and practice on a few machines to see if this is a career path for you, here are a few of the freebie tools I use and have had a ton of success with. Read More

Cisco resorting to intimidation tactics
Customers accuse Cisco of intimidation when they did not buy anything, or enough from, the world's leading and largest networking company. According to this Bloomberg story, Cisco questioned the competency of IT and networking officials at companies that rejected Cisco in favor of equipment from its competitors. Read More

Give developers what they want; they'll get it anyway
Developers think of a forge as a place to get, develop and share code. Turns out that data on their use of forges is very useful for analyzing development trends and the implications for IT professionals managing development. A study announced yesterday of data aggregated from four popular forges provides some great insights. Read More


WHITE PAPER: Avaya

A Look at What Midsize and Large Companies Really Spend
Nemertes has tracked how much companies spend on their IP-telephony deployments within the LAN and VOIP across the WAN. This paper reviews the latest deployment trends and costs associated with VOIP, and provides capital and operational cost details for midsize and enterprise implementations from four vendors. Learn More

Why Windows Phone 7 "Mango" is bango
Microsoft's Mango release of Windows Phone 7 qualifies as a Big Deal. Last week, the company made available the beta software development kit for developers, with production release set for Fall 2011, not quite a year after Windows Phone 7 debuted on the first handsets designed for it. Read More

Groupon IPO filing generates more jeers than cheers
While Groupon's IPO filing yesterday was certainly not unexpected, the largely negative reaction to it may surprise some, even if it fails to dampen enthusiasm for the offering. Read More

Preparing for World IPv6 Day
World IPv6 Day (June 8, 2011) is approaching. This will be a landmark day for IPv6 Internet connectivity and IPv6-capable content providers. You will want to be prepared for this historic day in networking. This article will give you the background on what is happening on that day and how to help your organization be ready for the fun. Read More


WHITE PAPER: Avaya

Single Vendor Network: Myth or Reality
Gartner conducted an analysis of hundreds of clients and found that introducing a second vendor into the network infrastructure has a significant impact on operational costs Read Now

Shame on Richard Stallman
Richard Stallman has made a career and name as someone who does not kowtow to authority. He fights for freedoms - freedom of choice in software, freedom from tyranny and freedom to choose. Read More

Why Microsoft and Citrix need each other
Desktop virtualization company Citrix made news last week with an overhaul of its major product lines and the introduction of "Project Olympus," a cloud infrastructure stack based on open source software. But pretty high up in CEO Mark Templeton's keynote at Citrix Synergy Conference 2011 in San Francisco was a big shout out to Microsoft. Read More

Leading FCoE server company? It ain't Cisco
Cisco might be making headway in blade servers, but HP is outdoing Cisco in a technology the router king has championed for a few years now - Fibre-Channel-over-Ethernet. Read More

Does the IRS need more options to fight identity theft?
The number of tax-related identity theft incidents is exploding and nowhere is that more obvious than at the Internal Revenue Service which as seen reports rice from 51,702 in 2008 to 248,357 in 2010. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. First look at Windows 8
  2. Clueless can hack Facebook in seconds over Wi-Fi
  3. Top 10 things every taxpayer should know about identity theft
  4. Cisco resorting to intimidation tactics
  5. Battle looms over securing virtualized systems
  6. Worst hackers ever?
  7. RSA's INsecurID
  8. 8 security considerations for IPv6 deployment
  9. Developers find a lot to love in Windows Phone 7 Mango
  10. Apple reportedly cracking down on iPad, iPhone giveaways

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: