Monday, December 05, 2011

Don't expect Woz to bid on 'The Contract That Founded Apple'

Are the Carriers Spying On You? | National Do Not Call Registry under attack from scammers, unrelenting telemarketers

Network World Voices of Networking

Forward this to a Friend >>>


Don't expect Woz to bid on 'The Contract That Founded Apple'
News this week that Sotheby's will auction off "The Contract That Founded Apple" - a partnership signed April 1, 1976 by the late Steve Jobs, Steve Wozniak and Ron Wayne -- no doubt caught the eye of techie collectors and even sparked speculation that Apple might buy the document. Read More


WHITE PAPER: Citrix

8 Reasons Why Citrix Beats F5
Is your network ready for the Cloud? Not with F5. Shift to Citrix NetScaler. Shift up to the Cloud. Download 8 Reasons Citrix NetScaler beats F5. Read now

WEBCAST: Nimsoft

Enabling your service desk to be the front face to IT
It's time to rethink old paradigms and implement agile, easy to use and on demand solutions. It's time to provide your service delivery team with knowledge enabling them to anticipate customer needs and requests and proactively solve them. Attend the interactive webcast and find out how. Learn more!

Are the Carriers Spying On You?
I probably shouldn't be, but I was stunned to read this article from Atlantic Wire, mostly discussing some embedded (to the point of being invisible) software in some smartphones that provides analytical data to the carriers. Read More

National Do Not Call Registry under attack from scammers, unrelenting telemarketers
It seems the nation's Do Not Call system is under attack. First The Federal Trade Commission issued a warning about scammers looking to gather personal information by pretending to represent the National Do Not Call Registry. The callers offer to provide an opportunity to sign up for the Registry but the FTC nor the Registry makes no such calls. Read More


WHITE PAPER: Riverbed

Adding Visibility to WAN Optimization
Too often network professionals find themselves stuck in reaction mode, which can prevent them for strategically planning for positive, long-term benefits. Read this report to learn some best practices for understanding and improving the visibility and performance of mission-critical, networked applications. Read now!

Making Sense of Cisco's Borderless Networks Architecture
By definition, Cisco's Borderless Network Architecture means a network with no borders. It's a simple statement but from the conversations I've had with decision makers, it's not the simplest concept to grasp. Read More

Facebook under privacy watch for 20 years, Zuckerberg: 'we've made a bunch of mistakes'
Facebook settled with the FTC over "charges that it deceived consumers by telling them they could keep their information on Facebook private, and then repeatedly allowing it to be shared and made public." Jon Leibowitz, Chairman of the FTC said, "Facebook is obligated to keep the promises about privacy that it makes to its hundreds of millions of users. Facebook's innovation does not have to come at... Read More


WHITE PAPER: Citrix

Investment Protection and Elasticity for your Network
NetScaler Pay-as-You-Grow. 5x capacity on-demand. No new hardware. Investment protection and elasticity for your network. Read more

Maybe 802.11ad Will Dominate After All
Hey, I know 802.11ac is being positioned as the successor to and logical upgrade path for 802.11n. But let's stop and think about that for a moment – 60 GHz. may make a lot more sense. Read More

Little-Known OpenSSL Tips and Tricks
Many network administrators know OpenSSL as a tool that implements Secure Sockets Layer (SSL) and Transport Layer Security (TLS) cryptographic protocols to secure your web surfing and email. But as we learned earlier this month, OpenSSL can do far more. With OpenSSL you can encrypt and decrypt files, verify file integrity, and see which encryption protocols and ciphers any server supports. Read More



SLIDESHOWS

25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known projects he thinks IT folks will love. What follows are his picks, along with a few of our own.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 2011's biggest security snafus
  2. Cisco to introduce larger Cius tablet next year
  3. Don't expect Woz to bid on 'The contract that founded Apple'
  4. Chrome takes No. 2 browser spot from Firefox
  5. How to turn off Carrier IQ on your iPhone
  6. 25 free open source projects IT pros will love
  7. Cracking ND5 ... with Google?!
  8. Real life HAL 9000 meets Skynet
  9. New year, new job? Ten companies that are hiring
  10. Everything I need to know about Linux I learned from my pets

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: