Friday, June 27, 2014

10 reasons why open source is eating the world

Network World Compliance - Newsletter -
New software targets hard-to-understand privacy policies | Microsoft's Smith calls for new privacy push in Congress

Network World Compliance

Forward this to a Friend >>>

10 reasons why open source is eating the world
Open source software, once just the domain of technology hobbyists, is taking over the software world. According to Gartner, open source software will be included in mission-critical software portfolios of virtually all Global 2000 enterprises by 2016. In fact, according to open source management vendor Black Duck Software, there are now a million different open source software projects. Here are 10 reasons for the surging popularity of open source software.To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Alert Logic

Alert Logic PCI DSS compliance solutions
Alert logic's cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logic's solutions and the unique benefits offered. Learn More


It's who you know: CDW + Microsoft Business Intelligence
That's why we partner with industry leaders like Microsoft. Their integrated suite of Business Intelligence solutions helps interpret data for small workgroups and large organizations alike. And through our strong partnership with Microsoft, CDW has the software and licensing expertise to find the right BI solutions for you. View Now

New software targets hard-to-understand privacy policies
The Privacy Icons browser add-on translates websites' privacy policies into nine easy-to-grasp categories Read More

Microsoft's Smith calls for new privacy push in Congress
Lamwakers need to address consumer privacy for data held by companies and for data gathered by spy agencies, he says Read More

Facial recognition proposal lacks privacy protections, advocate says
A trade group's recommendations for best privacy practices run counter to US values, an ACLU lawyer says Read More


Cloud Benefits for the IT Service Management Market
This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Learn More

Exposing hidden domain registrations could hurt innocent users more than criminals
Proxy services to hide details of domain registrants from the Whois database should be allowed, a researcher said Read More

Will full encryption sideline Google's targeted ads?
Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source? Read More

US NSA granted extension to collect bulk phone data
The FISC court granted the extension pending new legislation blocking bulk collection Read More

WHITE PAPER: APC by Schneider Electric

Data Center Projects: Advantages of Using a Reference Design
It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. In this paper reference designs are defined and their benefits are explained. Learn more

10 things to know about the smartphone kill switch
It's looking more and more likely that phones will sport a kill switch starting next year Read More

Researchers expect large wave of rootkits targeting 64-bit systems
Rootkits are again on the rise with the number of new samples reaching levels not seen since 2011, a McAfee report said Read More

Tool aims to help enterprise IT manage 'honeypot' hacker decoys
Developers of the Modern Honey Network want to simplify deployment and monitoring of these threat-intelligence systems Read More

8 technologies that are on the way out -- and one that we'll never be rid of
Soon-to-be-obsolete technologies "Image by Tim Reckmann/WikimediaIf "change is the only constant" applies anywhere, it's in the world of technology. One day you're proud of knowing how to set your VCR, and the next your DVR is recording shows you didn't even know were on. Few would have guessed in 1980 that vinyl records would be obsolete in 15 years; fewer still would have predicted that CDs would in turn be obsolete a mere 10 years after that.To read this article in full or to leave a comment, please click here Read More


5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Smooth like btrfs: Inside Facebook's Linux-powered infrastructure

2. Why One CIO Is Saying 'No' to BYOD

3. 10 tech support requests you never want to hear from your family

4. Hungry ants knock out FiOS service … again

5. Why Facebook's SDN switch won't affect Cisco's customers

6. A Wakeup Call for the Cloud

7. 10 things to know about the smartphone kill switch

8. 10 CEOs who took drastic pay cuts

9. Gartner: Top trends in IT security technology

10. The future of networking is a NOS on your choice of bare metal, says Cumulus Networks

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: