Tuesday, March 24, 2009

Net neutrality debate spills over to broadband stimulus; 5 myths about SaaS

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Novell
rule

Novell SUSE Linux Enterprise 11. Join the evolution.
Introducing SUSE Linux Enterprise 11. Now it's even more reliable, delivering high availability clustering at the lowest cost. It's more interoperable, bridging Linux and Windows. And it's more adaptable, powering your physical and virtual enterprise from desktop to data center. Join the evolution.

rule

Spotlight Story
Net neutrality debate spills over to broadband stimulus

Brad Reed By Brad Reed
Carriers and net neutrality proponents found themselves at odds Monday during a discussion on whether to place strict net neutrality conditions on any broadband network built using economic stimulus money. Read full story

Related News:

5 Myths About SaaS
Despite a growing track record of success, software as a service is still misunderstood by a surprising number of IT and business decision-makers. It's time to put to rest some misconceptions about SaaS. Let's bust the five most common myths.
5 SaaS myths busted
The limits of SaaS
SaaS puts focus on functionality
SaaS surprises: Broader appeal, customization, more
SaaS integration: Tricky, but manageable
PaaS gives developers a virtual toolbox
LiveOps moves from outsourcer to SaaS provider

VMware to manage virtual machines from mobile phones
VMware is set to release in the beginning of April a technology preview of a new feature that will let vCenter Mobile Access VMware users manage their infrastructure from mobile phones, it said on a company blog on Friday.

Banned poker sites make joker of ACMA's Internet blacklist
Less than a week after the federal government's URL blacklist was leaked and caused a furore over the status of online betting company Betfair, Australia's poker industry is now in the firing line over the number of legitimate poker sites that could be banned by the filter.

E-mail evidence in Madoff case includes another scam
U.S. attorneys prosecuting fraudster Bernard Madoff submitted letters from victims of his Ponzi scheme to the presiding judge on March 9 in the form of e-mail messages, but they appear to have mistakenly included evidence of a scam of a different sort in the filing.

Free tool from HP scans for Flash vulnerabilities
HP has released a free development tool that finds vulnerabilities in Flash, Adobe System's widely used but occasionally buggy interactive Web technology.

Is Your Living Room Ready for Internet Video?
Once upon a time, all you needed to tap into the wide world of TV was a TV--though a good set of rabbit ears didn't hurt. Internet video is way more complicated. Few networking tasks are more demanding than pumping video fast enough to avoid pauses, hiccups, and other glitches. So keep the following technical issues in mind before you cut up your Blockbuster card.

Cisco's data center assault spurs M&A talk
Investment firm USB lists other companies that may follow in IBM and Sun's footsteps in an attempt to stand up to increased competition in the data center.

Outsourcing prices falling, buyers getting savvier
Outsourcing prices will drop in the coming months, industry watchers speculate. Plus: Advice for making the most out of outsourced IT services.

CEO Pay: Ballmer is a saint compared to others
Given the economic hard times and the fact that Microsoft had some pretty spectacular fiscal achievements in 2008, Steve Ballmer's pay for the year was reasonable, almost saintly (compared to the greed of other tech execs).

Podcast: Cisco and the UCS Channel
Ken Presti reports on his discussion with Cisco senior director John Growdon, looking at the go-to-market elements associated with the vendor's data center announcement (4:52)

Play Xbox Games on Your Cell Phone
Imagine playing what looks like an Xbox 360 game -- on a $100 cell phone. That, according to Remi Pedersen, graphics product manager at ARM, is exactly what could be possible as soon as winter 2009 with its new higher-end Mali-200 and Mali-400 processors.

Robot takes to the runway at Japan fashion show
A multimillion dollar robot made its anticipated appearance at a Japanese fashion show on Monday but its stiff performance means runway models have a few more years before they need worry about being replaced by technology.
Watch the video: Robotic 'model' hits the catwalk

Spam filters block legitimate e-mail, finds test
Many antispam products still block an inconvenient amount of legitimate e-mail, a new test of leading products has suggested.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Novell
rule

Novell SUSE Linux Enterprise 11. Join the evolution.
Introducing SUSE Linux Enterprise 11. Now it's even more reliable, delivering high availability clustering at the lowest cost. It's more interoperable, bridging Linux and Windows. And it's more adaptable, powering your physical and virtual enterprise from desktop to data center. Join the evolution.

rule

Optimizing Systems Management.
IT professionals will realize lower costs and simplified management with a systems management appliance. Appliance-based systems should include: Comprehensive inventory support, secure application distribution, application usage monitoring and robust reporting. Find out if an appliance-based system is right for your organization today.
Download this whitepaper today.


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.

 

03/24/09

Today's most-read stories:

  1. No business case for IPv6, survey finds
  2. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  3. IBM/Sun deal could benefit Java, says Google's open source chief
  4. Skype for SIP targets business customers
  5. Voluntary separation scheme for Dell's Malaysian staff
  6. Hidden commands
  7. Ukrainian cybercriminals raked in $10K/day, Finjan reports
  8. E-mail evidence in Madoff case includes another scam
  9. Power grid is found susceptible to cyberattack
  10. Tweeted out of a job: "Cisco Fatty" story
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


SATELLITE 2009
The premier conference and exhibition providing pertinent information and actionable solutions to the satellite end-user community. SATELLITE 2009 provides a comprehensive conference program focusing on the vertical markets of the satellite community.
Visit now to register for the Conference and the Exhibition is free!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment