Search This Blog

Monday, December 21, 2009

Top 10 Buzzblog posts of 2009; Cloud computing: The telcos' game to lose

Cloud computing: The telcos' game to lose; Too Much Stuff in the Thing?
Network World logo

Voices of Networking

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Quest Software
rule

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure.

Learn More

rule

Spotlight Story
Top 10 Buzzblog posts of 2009

From a typo dropping Sweden off the Internet to Best Buy determining that Twitter proficiency is a job qualification, the year 2009 here on Buzzblog offered an unusually wide range of wonder and weirdness. Here's a slideshow of the top 10 posts based on the number of eyeballs that landed on them. Read full story

Related News:

Cloud computing: The telcos' game to lose
You're probably sick of hearing about cloud computing. I can't say I blame you. The buzz seems to be nearly deafening these days. And the most annoying part is that for those of us old enough to remember, it's "back to the future" all over again.

Too Much Stuff in the Thing?
Hey, you're probably reading this on your handset while you're out shopping for holiday gifts, and, if you're like me, you're probably looking at all of the cool new consumer electronics products available. A noticeable trend in recent years has been electronic devices becoming distinctly more multi-function in nature.

When ISPs Turn on Meters Expect "Unexpected" Traffic
If your ISP starts metering your Internet connection traffic, chances are you will see unexpected bytes register on your meter. That is because if you are like most Internet users, you don't know how much traffic your household produces. Here is a sampling of traffic sources that may surprise you.

Top 10 areas that CIOs needs to focus on for 2010
I speak to executives from all over the world and the question I've been asked a lot in the past two months is "Larry, how can I improve our image?"

Merry Christmas, Mr. Pettigrew
Mark Gibbs relates how Fidelity Investment has pretty much ruined the Christmas of four of their employees for what the company considers "gambling" on company time. The problem is that it was hardly gambling. Let the punishment fit the crime? Hah!

Story of the year: Newspapers and the Internet
As the year winds down, columnist Scott Bradner has been trying to decide how to summarize 2009 Internet-wise. It seems to him that the continuing saga of the news business symbolizes yet another year of close-to-terminal, Internet-induced confusion for traditional businesses -- or, maybe, panic.

Top Ten Scrooge List for SQL Server 2008
Thinking of Christmas as a special time of year invariably raises thoughts of the Dickens classic "A Christmas Carol". There's a little bit of Scrooge in all of us, waiting to be redeemed by a random act of kindness as we approach the holidays. In the spirit of the season, I started thinking about those features that Microsoft charges top-dollar for in SQL Server 2008 Enterprise Edition.

Caught on tape: Burglars target wrong techie
Maybe the Supreme Court ought to consider this scenario as it grapples with legal issues surrounding private electronic communications filtering into and out of the workplace.A Framingham, Mass., resident received an urgent text message at work on Friday. It was from his home computer reporting the presence of movement inside of his apartment, which he had equipped with a motion detector.

Got Facebook privacy concerns? You ain't seen nothing yet
Carnegie Mellon University researcher Tom Mitchell says that privacy risks "on a scale that humans have never before faced" hinder real-time data analysis that could be used to solve health, traffic and human behavior problems.

via Twitter: No seriously, "Operation Chokehold" is incredibly stupid
My favorite response, via Twitter today, to Fake Steve Jobs' "Operation Chokehold" scheme -- do lots of data-intensive things on your iPhone to bring AT&T's wireless network to it's knees for awhile -- is by Rich Brome, of phonescoop.com:"No seriously, 'Operation Chokehold' is incredibly stupid. What happens when someone dies because they can't reach 911 that hour?"

Will 2010 Be "The Year of IPv6?"
Any time you predict the imminent rise of IPv6 you have to do so with tongue firmly planted in cheek. I did a brief Google search and found articles dating back to the early 2000s predicting the oncoming year of IPv6.

Today from the Subnet communities

On Cisco Subnet:Are Cisco's acquisitions working for the company? and iACLs; A Service Providers Best Practice on your LAN; On Microsoft Subnet Microsoft Exchange 2010: A hard upgrade and not yet in the cloud: On Google Subnet: 10 best Chrome extensions

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

Looking for a fast payback?
Spend 10 minutes with free JDE ROI Tool and save thousands! Learn how you can boost ROI and productivity with a JDE technology refresh. Included is a user-friendly video tutorial that shows how you can tailor the parameters to meet your specific needs and business scenarios.
Learn More


Improve Data Center Monitoring and Management with BSM and ITIL
Older generation monitoring products are not able to unify fault/event, performance management and BSM all within one system. This gap forces IT to deploy and integrate multiple systems in order to get an end-to-end view. Read this white paper to learn about a streamlined approach that goes beyond measuring the technical performance of servers and network nodes and provides real-time visibility into the business impact of specific service problems.
Learn more!

 

December 21, 2009

MOST-READ STORIES

  1. The 10 best Chrome extensions for work and play
  2. Unencrypted drone video intercepted by militants
  3. Seven features in Windows 7 you probably don't know about
  4. Is Windows 7 the last major chapter in Windows story?
  5. Bank's antifraud tactics stun security expert
  6. Cisco will be hard pressed to match 2009
  7. Mixed signals from Cisco on security
  8. 10 wacky USB devices
  9. Network plans of a large Cisco customer not in Australia's best interest
  10. Will 2010 be the year of IPv6?

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: