You Must Obey: The Unwritten Laws of Technology Gordon Moore has one law but we've got him beat. Here at the (unofficial) Tech Law Brain Trust, we maintain a definitive, ever-expanding archive of the laws that govern your technology experiences--whether you know it or not. Please scan these lists to ensure that you are in compliance. How to Evaluate, Compare and Implement Enterprise Antivirus Antivirus software has been around-well, nearly as long as viruses. But thanks to the ever-growing variety of threats to the PC environment, this is a fast-changing market that is undergoing two major trends: Mobile Security: How Gadgets Evolved CSO Publisher Bob Bragdon is a self-proclaimed "gadget head." His collection, which spans from 1987, runs the gamut from primitive digital address book to the latest generations of today's Blackberry and iPhone (Check out the slideshow to see pictures of all of them). Online Backups Save Up-Front Hardware Costs If you still haven't built a back up plan because of hardware costs, shirk those fees, and focus on an online service. You'll pay a monthly fee instead of hundreds or thousands of dollars up front, scaling up service across as many systems as you need. August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment