Search This Blog

Monday, September 21, 2009

FCC chair give net neutrality a huge boost; Are netbooks ready for the enterprise?

Are netbooks ready for the enterprise?; The Most Promising Games of Fall 2009
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Double-Take Software
rule

Thinking Beyond Tape: The Case Against Tape Backup
Many companies are already backing up their main and branch office systems to tape, but what they don't understand is just how vulnerable their data and their business remains. This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup.

Learn more.

rule

Spotlight Story
FCC's Genachowski gives strong net neutrality endorsement

FCC chairman Julius Genachowski proposed two new rules that would bar carriers from blocking or degrading lawful Web traffic and force carriers to be more open about traffic management practices. Read full story

Related News:

Are netbooks ready for the enterprise?
5 reasons to deploy netbooks; 5 reasons not to.

The Most Promising Games of Fall 2009
Now all we need is new games--and they're on the way. Here's a look at the Lamborghini and Bugatti racers of Gran Turismo PSP, the shuffle-the-scenario option of Halo 3: ODST, and the host of new multiplayer features in Modern Warfare 2, plus many other exciting developments that are coming this fall.

Dell buying Perot Systems for $3.9B
Dell has agreed to buy Perot Systems for around $3.9 billion in cash, answering last year's HP buyout of EDS.

Microsoft urges users to disable vulnerable Windows network protocol
Attack code that exploits a critical unpatched bug in Windows is likely to go public soon. Until Microsoft can create a fix, the company wants users to run an automated tool that disables the vulnerable component.

Last major PC makers ditch Chinese Web filter
Some of the few PC makers who offered a controversial Web filtering program mandated by China have reversed those plans, dealing the latest blow to China's efforts to deploy the software nationwide.

Is Your Office Printer Secure?
A new program from ISCA Labs aims to tackle network-attached device security - a problem they believe is overlooked and poses serious risks.

How to measure social media payoff
Tech-savvy fans of the Georgia Aquarium got a special deal this past spring: a big discount on ticket prices. The aquarium offered 25% to 40% off admission prices from February through May to people who followed it on Twitter or signed on as Facebook or MySpace fans.

Surveilled to death
Gibbs ponders how much we're tracked and how much we give away and wonders what the long-term outcome will be; a society of closed lips and constrained behavior, a society economical with the truth, or will it just stay business a usual?

IPv6: Users not sold on the value
We've been hearing about IPv6 for several years now, and in fact more and more devices now support IPv6. But the overwhelming question remains: Is there a Business Case for this migration?

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.


Live Webcast: The Benefits of Integrated IPS
If a traditional distributed Intrusion Prevention System seems too complex then integrated IPS everywhere might be the right strategy for you. The benefits will be discussed during this Live Webcast, Thursday, September 29, 1:00 p.m. EST/10 a.m. PST. Get IPS deployment best practices and tips on selecting the right operational tools.
Register now.

 

September 21, 2009

MOST-READ STORIES

  1. Microsoft's CodePlex Foundation has credibility issues already
  2. 10G Ethernet shakes net design to the core
  3. An amazing laptop recovery story
  4. Microsoft Internet Explorer SSL security hole lingers
  5. Skype Founders sue eBay: What's going on?
  6. 10 cool Web apps developed in two days
  7. 10 in IPv6 does not equal 10 in IPv4
  8. Nortel users should hope for best, prepare for worst
  9. Curious George's latest mischief: malware
  10. Cisco forms smart grid ecosystems

Do More with Less Thru Netcool?
This white paper outlines methods to help service providers improve overall operational efficiency within the service assurance operational environment. Learn how IBM Tivoli® Netcool® solutions can help service providers streamline their operations, improve responsiveness and reduce costs.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: