Monday, June 11, 2012

Online propaganda and the National Defense Authorization Act

RIM – OK, Now It's Over | Once You Go Ipv6 You Won't Go Back

Network World Voices of Networking

Forward this to a Friend >>>


Online propaganda and the National Defense Authorization Act
The National Defense Authorization Act has proposed amendments that would let the government wage a propaganda war online ... in the history of bad political ideas, this is epic. Read More


WEBCAST: HP and Polycom

Dramatically Simplify Video Collaboration Deployments
If you want to dramatically simplify video collaboration deployments, centralize management, improve business productivity, and reduce IT costs associated with rich media communications, you do not want to miss this informative webinar. Register now!

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Final Week to Register!
IT Roadmap only comes to Denver once a year so don't miss this opportunity to join hundreds of local colleagues who will gain a year's worth of enterprise-ready ideas, answers, best practices, and key contacts all in one day – in one place. Attend Free. IT Roadmap Denver – 6/20 - Colorado Convention Center.

RIM – OK, Now It's Over
Let me begin by saying that it pains me deeply to write this one. I'm not a BlackBerry user, but my history with Research in Motion goes way, way back, all the way, in fact, to the legendary 850/950 and 857/957 models that were initially compared (very favorably, I might add) to pagers, not phones. RIM is one of the truly pioneering firms in subscriber units for wide-area mobility, but, just like Palm... Read More

Once You Go Ipv6 You Won't Go Back
In case you didn't already know it, today is the second annual IPv6 day (or IPv6 Launch Day). Last year some of the leading website operators and ISPs switched over to IPv6 for the day. Despite predictions of doom and gloom, the day went off without hardly a hitch. Read More

Who Can You Trust?
There has been much written recently about Flame, the latest sophisticated cyber attack /malware discovered by security researchers. Flame follows Duqu and Stuxnet before that as very sophisticated cyber attack vehicles that seem to be state-sponsored cyber weapons. In fact the NY Times ran a whole expose on this last week. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Do More with LogMeIn Central!
Monitor, Manage and Automate system tasks with LogMeIn Central. Take back your time. Use Central to quickly deploy Windows Updates at the same time across multiple PCs. Free trial for 30 days.

A Facebook Phone? You're Kidding, Right?
I normally don't comment on rumors, and I have no direct knowledge of any initiatives related to the topic at hand today, so let's put this one in the realm of hypothetical strategy. We do a lot of strategy work here at Farpoint Group; I think the setting of grand objectives and the derivation of the plans, techniques, procedures, resoruces, tools, and risk/reward analysis to achieve those objectives... Read More

Cisco gear sold to Iran despite sanctions
Despite sanctions that prohibit sales of American technology to Iran, an Iranian mobile operator was able to source equipment from Cisco, HP and Sun, which is now owned by Oracle. Read More

The Information Security 80/20 Rule
Over the past few months, I've been engaged in a research project on enterprise security management and operations. As part of some quantitative research, ESG created a segmentation model that divided survey respondent organizations into three sub-segments. The segmentation model broke down as follows: Read More


WHITE PAPER: Symantec

Customer Success - Tree In The Glen
Treehouse in the Glen replaced a variety of security solutions with Symantec Endpoint Protection Small Business Edition. Since deployment, the store has had zero virus infections, system performance has improved, and security management time has dropped from three hours a week to 15 minutes. Learn More

In Search of the Value of Session Management
It's been a couple of weeks since Interop and I've had some time to think about some of the happenings from the conference. One of the sessions I ran was a panel on the value of session management, and I came away disappointed in the panel responses. Session management has been hyped by the vendors as one of the next big things in Unified Communications. On my panel I had a number of representatives... Read More

Get ready for more TSA pat-downs
Most everyone hates pat-downs, even TSA employees are sick of them which resulted in firing or suspending 43 TSA supervisors and front-line screeners, 15% of the 280 TSA workers at Southwest Florida International Airport. Read More

Why can't Microsoft innovate with Windows 8 as it is with Xbox 360?
At the Electronic Entertainment Expo (E3) today, Microsoft unveiled a number of interesting innovations that link the company's successful Xbox 360 game console to other devices, including PCs, smartphones and tablets, and finally give the Xbox 360 the ability to easily browse and navigate the web. Before unveiling SmartGlass and Internet Explorer for Xbox, Microsoft posed the following questions... Read More

Cloud fever and TonidoPlug: Your own personal cloud
I know why you're happy ... you've got cloud fever. You can't get enough of cloud this and cloud that so, as a change from megascale, enterprise-scale, cumulonimbus-like behemoths, let's look at a something more on the wispy, happy, summer stratus-like scale. The TonidoPlug 2, which is based on the SheevaPlug and developed and marketed by CodeLathe LLC, is a personal cloud system that is really cool, amazingly well-featured, and remarkably inexpensive. Read More



SLIDESHOWS

Why the Internet needs IPv6
Explosive growth of Internet users, devices, apps creates demand for more IP addresses.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Gartner: Top 10 emerging infrastructure trends
  2. How to determine if your LinkedIn password has been compromised
  3. Googler on why he left ... for the third time
  4. What to expect in Apple's upcoming Maps app
  5. The life of a 'booth babe': high heels, long hours and leering visitors
  6. A laugh for those whose LinkedIn passwords were leaked
  7. Feds investigate who leaked classified Stuxnet cyberattack details to NYT
  8. Can Mozilla right the ship?
  9. Microsoft opens Azure to IaaS, Linux
  10. Cisco gear sold to Iran despite sanctions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: