Search This Blog

Tuesday, January 15, 2008

How safe are your files from government inspection?

Unified Communications Alert

Network World logo
NetworkWorld.com | Software Research Center | Update Your Profile

SPONSORED BY PLATESPIN
rule

Create a More Efficient Data Center
Discover how workload lifecycle management lowers costs and creates operational efficiencies in this detailed whitepaper. A workload encapsulates the data, applications and operating systems that reside on a physical or virtual host. Learn how using technologies that unify the management of workloads can improve your data center. Download this whitepaper now.

rule

SPOTLIGHT STORY
How safe are your files from government inspection?

Michael Osterman By Michael Osterman
The U.S. government believes it can freely search the contents of your laptop or other mobile device upon entering the United States, since it views this practice as conceptually identical to searching your luggage at the airport, which it can do without any sort of probable cause. A federal appeals court agrees with the government�s position and few judges seem to disagree with the practice. The good that comes from this practice is that child pornographers can be thwarted, but the quite serious downside is that the Fourth Amendment is effectively ignored. Read full story

For webinars or research on messaging, or to join the Osterman Research market research survey panel, go here. Osterman Research helps organizations understand the markets for messaging and directory related offerings. To e-mail Michael, click here.

RELATED NEWS:

Scalix adds to Outlook support in its Linux e-mail server, 01/09/08 Scalix Wednesday released a new version of its Linux-based e-mail server adding encryption support for Microsoft Outlook clients that eliminates the need for a VPN.

Holiday spirit helped double Storm worm, 01/10/08 Some clever, sexy Christmas-themed spam and a long holiday season helped the criminals behind the notorious Storm Worm more than double their ...

Storm splinters, starts phishing, say researchers, 01/10/08 Part of the Storm botnet appears to have been rented out to identity thieves, who are using it to conduct traditional phishing attacks that target customers of a pair of U.K.-based banks, researchers said Wednesday.

Spam your printer from the Web? Researcher shows how, 01/09/08 Aaron Weaver has made a discovery the world could probably do without: He's found a way to spam your printer from the Web.

Don't let e-mail impair productivity, 01/08/2008 Sometimes I think that e-mail is a curse. When I look at my apparently inexhaustible list of pending e-mail messages, I feel like turning off my ...


WORTHWHILE WEB SITES
20 most useful Web sites for IT professionals For both work and pleasure, here are 20 useful sites for IT professionals.

ASK THE MAGIC '08 BAll
CES International 2008 Take a look at the eight hottest technologies for 2008.

SPONSORED BY PLATESPIN
rule

Create a More Efficient Data Center
Discover how workload lifecycle management lowers costs and creates operational efficiencies in this detailed whitepaper. A workload encapsulates the data, applications and operating systems that reside on a physical or virtual host. Learn how using technologies that unify the management of workloads can improve your data center. Download this whitepaper now.

rule

Featured Webcast for Newsletter Subscribers
Improve App Performance with Web Acceleration. Find out how to improve the delivery of Web applications to geographically dispersed users with Web acceleration tools. Learn how to shop for these products and find out what the best and worst applications are. http://www.accelacomm.com/jlp/PSA2_80162151/7/80162151/

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/15/08

TODAY'S MOST-READ STORIES:

  1. Young IT workers disillusioned
  2. Eight hot technologies for 2008
  3. IBM retains lead among patent winners
  4. MySpace hacked, serves fake Windows update
  5. The future of IT jobs? Not all bad news
  6. Prize offered to speed airport security lines
  7. The 15 best downloads of the year
  8. Torvalds breaks down Linux
  9. Microsoft's response to Xbox's wireless signal
  10. Apple iPhone doomed to failure

MOST-READ TEST:
Cisco's virtual switch smashes throughput records


Unifying management systems

Learn the benefits of unifying your network and voice management systems in this Special Brief. You will learn how marrying these platforms will reduce demands on your limited IT budget and staff. Learn more today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Unified Communications Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2008

 

 



No comments: