Search This Blog

Monday, June 04, 2007

The weird and the cool; RFID privacy: Why not do it right?

Network World

Voices of Networking




Voices of Networking, 06/04/07

By Jeff Caruso

Gearhead: Hardware: The weird and the cool, 05/31/07
This week we were going to continue the discussion launched last week about CD/DVD creation and management tools, but because of technical problems, we've had a slight change of plan.

Bradner: RFID privacy: Why not do it right? 05/29/07
California is again taking the lead on privacy issues (see “Knitting legal patchwork quilts"). The state’s approach with one use of RFID is a good one, but unfortunately it is only looking at a very small part of the problem.

Lippis: Application intelligence to the rescue, 05/31/07
Networks have traditionally supported applications by providing a transport service. Over the years, this transport service was optimized through QoS mechanisms in an effort to prioritize one set of applications over another.

The IDC Enterprise Panel: Join IDC's panel of IT influencers and decision-makers.

Your contributions will be compiled and distributed to technology and telecommunications vendors all over the world. As a thank you for joining, you will receive select free IDC research, and discounted IDC conference passes.

Click here to learn more

Nolle: European carriers take the lead, 05/31/07
Anyone who travels outside the United States quickly realizes that the people "over there" know a lot more about us than we do about them.

Antonopolous: Security budgets up, 05/30/07
Since January, I’ve spent a lot of time interviewing IT executives for a benchmark research report on Security and Information Protection. The statistical analysis of the results of this research shows some interesting trends. It’s been a

Cool Tools: Palm's mobile companion certainly looks like a laptop, 05/30/07
If it looks like a laptop, acts like a laptop, maybe even smells like a laptop, is it a laptop? Nope -- if you're Palm, it's not a laptop, it's a "mobile companion."

Johnson: Selling IT to business, 05/30/07
In recent columns, I’ve discussed the need for business to align with IT. Yes, you've got that right -- my point is that successful businesses need to ask how they can best leverage IT as a strategic asset.

Insider Threat: Inventorying your intellectual property, 05/28/07
I have been tasked with inventorying my company's intellectual property. Some things are obvious, such as source code, business plans, and customer lists. What else would fall into this category, in your opinion? How often should my company inventory ...

TODAY'S MOST-READ STORIES:

1. Did Google's Street View spook even Eric Schmidt?
2. The IT department as corporate snoop
3. MLB doesn't get it
4. Avaya buyout rumors reveal VoIP market churn
5. Google Desktop vulnerable to new attack
6. Michigan man fined for using free Wi-Fi
7. Dell + Linux + Wal-Mart
8. Researcher: Don't trust Google Toolbar
9. E-mail scammers hide malware in fake IRS notices
10. Google makes Web applications work offline

MOST DOWNLOADED PODCAST:
Twisted Pair: No lonely cowboys at Interop 2007


Contact the author:

Jeff Caruso is managing editor of online news for Network World. He oversees daily online news posting and newsletter editing, and writes the NetFlash daily news summary, the High-Speed LANs newsletter and the Voices of Networking newsletter. Contact him at jcaruso@nww.com



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: