Search This Blog

Monday, April 27, 2009

The legal risks of ethical hacking; Coolest robots of 2009; RSA's Innovation Sandbox

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Sun Microsystems
rule

Sun Microsystems Change Your Storage Economics
The Sun Unified Storage Systems. Storage made simple, just when you need it most. Get a 60-day free trial then buy at 20% off. Try It Now.

rule

Spotlight Story
The legal risks of ethical hacking

Jon Brodkin By Jon Brodkin
Tracking down malicious computer activity can put researchers on shaky legal footing. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Coolest robots of 2009
CCS Robotics builds autonomous robot bases that can be adapted to a variety of uses. The company ships a variety of products including SpeciMinder, a robot that delivers specimens within a hospital so nurses don't have to. The RoboCourier is a 'healthcare transporter' designed to makes deliveries within a lab environment.

RSA's Innovation Sandbox
RSA sponsored its first Innovation Sandbox award in which 10 finalist companies as voted by visitors to the RSA Web site demonstrated their wares then presented them to a panel of judges, who chose the winner based on their market impact, technological significance, quality of their management teams and quality and professionalism of their presentations.

Conficker.E to self-destruct on May 5th?
The evolution of the multi-faceted Conficker worm is expected to take another turn this May 5th when the latest version, Conficker.E, will simply self-destruct on infected machines, say a number of security researchers.

First Android netbook to cost about $250
The first netbook computer running the Google Inc.-backed Android mobile operating system on a low-cost ARM chip could become available to customers within three months, the maker's co-founder said this week.

Universities get $5 million in grants to use IBM/Google cloud
The IBM/Google cloud computing project for universities got a boost Thursday with the National Science Foundation awarding nearly $5 million in grants to 14 universities participating in the initiative.

Study: Not replacing laptops can prove very costly
Companies looking to cope with declining IT budgets by postponing the purchase of new laptop computers are likely making a mistake, according to a new report released by technology consulting firm J. Gold Associates.

Microsoft and Apple: A Tale Of Two Cities
Mitchell Ashley compares the earning reports of Apple and Microsoft in his Converging on Microsoft blog. The two couldn't be more different.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Sun Microsystems
rule

Sun Microsystems Change Your Storage Economics
The Sun Unified Storage Systems. Storage made simple, just when you need it most. Get a 60-day free trial then buy at 20% off. Try It Now.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/27/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Researchers show how to take control of Windows 7
  3. The evolution of Ethernet
  4. Intel CPU cache poisoning: dangerously easy on Linux
  5. The downfall of Sun
  6. Einstein systems to inspect U.S. government's Internet traffic
  7. Microsoft posts historic revenue stumble in quarterly earnings
  8. Apple dismisses netbook trend
  9. Cloud computing a 'security nightmare,' says Cisco CEO
  10. Top 10 technology skills
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: