Tuesday, February 21, 2012

H.R. 1981, the jaws of law will eat your Internet rights

Note to Congress: Pass Cybersecurity Legislation Now | Intellectual Ventures sues AT&T, Sprint and T-Mobile

Network World Voices of Networking

Forward this to a Friend >>>


H.R. 1981, the jaws of law will eat your Internet rights
Like the great white in Jaws there's proposed legislation about to strike and it's your liberties that will have a chunk missing Read More


WEBCAST: Oracle and Intel

Develop HA Databases in Hours
Date: February 29, 2012 Time: 1:00 PM EST Attend this Webcast to discover how the Oracle Database Appliance can help you increase your ROI by: • Reducing deployment time from weeks to hours • Simplifying ongoing maintenance and support • Benefitting from the highest levels of availability Learn More

WHITE PAPER: Quantum

Meet "Big Data" Backup Challenges
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

Note to Congress: Pass Cybersecurity Legislation Now
Earlier this week, the Senate Homeland Security and Government Affairs Committee (HSGAC) introduced a cybersecurity bill that would outline the Department of Homeland Security's responsibilities for overseeing cybersecurity at privately-owned critical infrastructure organizations. Read More


WHITE PAPER: HP

Global Communications Services Enterprise
This solution brief documents why the HP ProLiant DL980—not Oracle Exadata—proved to be a perfect fit for a communications firm's Sun environment, with the capacity, performance, availability and simplicity for enterprise databases. Learn more

Intellectual Ventures sues AT&T, Sprint and T-Mobile
Intellectual Ventures, a self-described defender of inventors that is more commonly known as the patent troll founded by former Microsoft CTO Nathan Myhrvold, today filed suit against AT&T, Sprint and T-Mobile. Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Robots jockey for position ... atop racing camels?
While not a new phenomenon, those of you who have seen this before will need to excuse me for believing that I can't possibly be the only one who hasn't until today: We're talking about robotic jockeys, instead of the more common human variety, riding atop racing camels. Reuters today is offering a series photos taken by Stephanie McGehee yesterday in Kuwait of such a race, as well as an explanation... Read More

Wringing out $79B worth of IT: Feds debate system duplication
When you have some of the largest IT organizations on the planet, it probably comes as no surprise - though no less of a costly problem --when you find out you have multiple redundant systems. Read More



SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Report of Google already moving onto Android 5.0 draws doubts
  2. iPad 3 rumor rollup for the week of Feb. 14
  3. Forget about public or private cloud, it's all about hyper-hybrid
  4. RSA brushes off crypto research findings that RSA algorithm is flawed
  5. IRS unearths Dirty Dozen tax scams of 2012
  6. Highlander bot: There can be only one?
  7. Hands on with Apple's new OS X: Mountain Lion
  8. Cisco on Microsoft/Skype: Sour grapes?
  9. EFF promises new fight against software patent abuse, but ....
  10. Exactly what is Homeland Security watching for on Facebook, Twitter, YouTube?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment