Monday, October 01, 2012

An iPad stand, a WiFi access point, and a honeypot

Even World of Warcraft is tracking you! | John Chambers' almost excellent adventure

Network World Voices of Networking

Forward this to a Friend >>>


An iPad stand, a WiFi access point, and a honeypot
I've checked out many iPad stands over the last few months and I just found what I think is one of the very best: The Uprise 360 produced by Hub Innovations. This is a dead simple design which your iPad (version 2 or 3) snaps into and you can rotate it to portrait or landscape as required. It's easy to remove the iPad when you need to and that's it ... as I said, it's dead simple and does the job. For $39.95 the Uprise 360 produced by Hub Innovations Uprise 360 gets a Gearhead rating of 5 out of 5. Read More


WHITE PAPER: Anue Systems

Getting Visibility and Control of the 40 Gigabit Data Center
40GbE is the enterprise's next network speed evolution. A network monitoring switch provides a bridge for High-Speed Ethernet---increasing network visibility, improving monitoring tool utilization and data center productivity. Learn More.

RESOURCE COMPLIMENTS OF: AT&T

Voice Transformation: Taking the First Steps
Voice has been - and will continue to be - a foundational component in business communications. But the aging, disconnected voice infrastructures of today are doing more than just impeding productivity, they're impeding progress. Find out in this AT&T article how to transform voice communication in your enterprise today. Click Here

Even World of Warcraft is tracking you!
Is there any organization or company that can resist surreptitiously tracking its customers? Read More

John Chambers' almost excellent adventure
Cisco CEO John Chambers had a very active week this week, making the rounds with the daily business press to address such topics as his retirement, rival HP and suggestions for the next President of the United States. His week ended with the disclosure that his compensation dropped 9% based on Cisco's stock price and its challenges in facing up to - and down - competition and the macro economy. Read... Read More

Did Microsoft really waste data center power to avoid a fine?
The New York Times ran a rather dubious story on Sunday concerning the power consumption of data centers that has left many tech journalists shaking their heads in disbelief, mostly because it was so damn inaccurate. The story depicts data center operators as irresponsible power wasters and callous polluters, emphasizing the low utilization of the thousands of deployed servers in larger data centers.... Read More


WHITE PAPER: ITinvolve

The Reasons CMDBs Don't Work
There is no shortage of reasons why CMDB initiatives fail. A lack of trust in the data, the time consuming nature of these projects, and the inability of end users to see their value are frequently cited. Learn More!

Take Responsibility For Your Security
In this political season we are hearing a lot about how individuals need to take responsibility for their own lives. We don't want a society that is dependent on the government (or maybe we do, I don't know) for support. Well in information security this issue is of critical importance. If you are not responsible for the consequences of you actions around security, why would you ever take them seriously? ... Read More

The three best, Star Wars-influenced approaches to learning Linux
Recently, a friend and I were discussing the pluses and minuses of watching the Star Wars films in various orders. (What can I say? I didn't play football in high school. This is what I do.) The primary purpose of our conversation: to find the optimal viewing order to introduce the Star Wars universe to someone who has never seen the films before. RELATED: Desktop Linux is dead? I thought it was... Read More

IBM cyber security watchdogs see increase in browser exploits and encryption abuse
IBM's security watchdogs said their research shows a big increase in browser-related exploits, renewed concerns around social media password security and challenges with securing mobile devices, especially in a corporate setting. IN THE NEWS: First look: Inside the iPhone 5 Read More


WHITE PAPER: Riverbed

CIO's Guide to Advanced Consolidation
Consolidating IT infrastructures is a continuing trend, particularly in an uncertain economy with organizations looking to reduce costs. Learn more.

Torvalds calls Romney 'a f***ing moron'
"He really seems to be a f***ing moron," Linux creator Linus Torvalds wrote of Republican presidential nominee Mitt Romney late last night on Google+, using two fewer asterisks than you see here. Read More

Mitigating advanced persistent threats within industrial and critical infrastructure environments
Industrial control systems (ICSs) are the backbone of our industrial and critical infrastructures. As organizations connect their ICSs to the Internet, or integrate them with enterprise applications, the ICSs become vulnerable to cyberattack through everything from common malware to advanced persistent threats (APTs). Mitigating the risk of APTs in industrial control systems takes a special kind of firewall. Read More

Marissa Mayer means business at Yahoo
Former Google executive and now Yahoo CEO Marissa Mayer is wasting no time implementing a number of singificant changes at the once proud Internet portal. Whether you like her or not, you simply can't deny that Mayer is an engaging and intelligent leader overflowing with moxie. Read More



SLIDESHOWS

15 more useful Cisco sites
Another lineup in our continuing search for the most useful sites on the Web for Cisco users and practitioners.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. You might be surprised at which Web browser aced this security test
  2. As promised, Islamic hacktivists disrupt PNC Bank
  3. 12 common project management mistakes -- and how to avoid them
  4. Google eyeing development of $99 Nexus 7 tablet
  5. Hottest Android news and rumors for the week ending Sept. 28
  6. .xxx to launch porn search engine
  7. Torvalds calls Romney 'a f***ing moron'
  8. Virtual reality gets real
  9. Free iPhone data usage tracker released by Princeton lab
  10. Three quick hits, misses for the iPhone 5

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment