NETWORK WORLD NEWSLETTER: NETWORKING TECHNOLOGY UPDATE
07/06/05
Dear security.world@gmail.com,
In this issue:
* What's more secure, open source code or proprietary closed
source operating systems and applications?
* Links related to Networking Technology Update
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by DuPont
Limiting the Plenum Cable Fire Risks
Concerns are rising about the growing number of combustible
cables present in commercial buildings required to service the
ever-increasing demands of IT networks. More workstations are
taxing our infrastructure. These concerns are the thrust behind
new "limited combustible" cables that reduces fire safety risk.
Learn more by reading this white paper now.
http://www.fattail.com/redir/redirect.asp?CID=107794
_______________________________________________________________
WHAT YOU CAN DO TO PREVENT DATA-THEFTS?
For years, hackers have obtained confidential information by
manipulating legitimate users into revealing it. It's critical
that companies convey to their employees - local and remote -
why security measures are important. If you're curious to see
how your company's security efforts stack up, click here for
more:
http://www.fattail.com/redir/redirect.asp?CID=107667
_______________________________________________________________
Today's focus:
Open source vs. Windows: Security debate rages
By Ellen Messmer
It's a topic of fierce debate among high-tech cognoscenti:
What's more secure - "open source" code such as Linux and
Apache, or proprietary "closed source" operating systems and
applications, Microsoft's in particular?
The regularity with which Microsoft has taken to announcing
vulnerabilities and consequent software fixes has left few
cheering about its security. In contrast, high expectations
endure for open source, with proponents arguing that it's
inherently more secure because a much larger set of developers
can read the code, vet it and correct problems.
"I'm struggling to think of anyone who would argue the other
way," says Adam Jollans, chief Linux technologist at IBM
Software Group.
"Discovery is different in the open source and closed source
approach," Jollans says. "Because source code is visible to lots
of people, if there is a security issue, it tends to be spotted
earlier. The open source community isn't shy about criticizing
bad code." He added that a version of Linux, SuSE Enterprise
Server 9, in March became the first to earn the
government-approved International Common Criteria certification
for security level 4, comparable to what Microsoft achieved with
Windows Server 2000 in security test reviews three years ago.
Tim Clarke, IT director at Manifest, a maker of electronic
voting and research tools for investment firms in England, feels
much the same way about open source security. He says open
source developers are "more agile and feel more exposed on a
personal level to criticism at whatever level that might be
aimed at their products."
To read more go to:
<http://www.networkworld.com/nltechupdate2972>
_______________________________________________________________
To contact:
Ellen Messmer is Senior Editor, Enterprise Applications at
Network World, she can be reached at: emessmer@nww.com
_______________________________________________________________
This newsletter is sponsored by DuPont
Limiting the Plenum Cable Fire Risks
Concerns are rising about the growing number of combustible
cables present in commercial buildings required to service the
ever-increasing demands of IT networks. More workstations are
taxing our infrastructure. These concerns are the thrust behind
new "limited combustible" cables that reduces fire safety risk.
Learn more by reading this white paper now.
http://www.fattail.com/redir/redirect.asp?CID=107793
_______________________________________________________________
ARCHIVE LINKS
Technology Update archive:
http://www.networkworld.com/news/tech/index.html
_______________________________________________________________
Best practices for disaster recovery across the WAN
View this webcast to learn how you can optimize application
performance, increase WAN capacity and improve business
productivity. See how you can meet business needs for data
availability without impacting the WAN.
http://www.fattail.com/redir/redirect.asp?CID=107610
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY
IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment