Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, August 25, 2009
12 words you can never say in the office; Hello, SCO: Judge overturns 2007 Unix copyright decision
Hello, SCO: Judge overturns 2007 Unix copyright decision; Judge vacates three of four charges against SF network admin Terry Childs
If you're old enough to understand the reference in this headline - George Carlin, anyone? - then you're old enough to need a refresher course when it comes to talking about technology. Read full story
August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.
Next-Generation Data Centers IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands. Learn more.
Unifying Management Systems for Deep Savings To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper. Read Now
Perfecting your Disaster Recovery Strategy How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications. Learn More