Tuesday, March 23, 2010

Health care bill, networking and security

The crooks in the cloud | Online prankster David Thorne

Network World Security

Forward this to a Friend >>>


Health care bill, networking and security
In 2009, the Federal government passed the Health Information Technology for Economic and Clinical Health Act (HITECH). The HITECH act invests $17 billion in information technology infrastructure and Medicare and Medicaid incentives to encourage doctors to adopt technologies for Electronic Health Records (EHR) and then elextronically share health data. The act also strengthens Federal privacy and... Read More


WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

WHITE PAPER: Cisco Systems Inc.

Peace Corp: Creating a worldwide unified network
Learn how the Peace Corp made its unified network a reality after selecting and deploying cost-effective WAN optimization gear. One of the key factors was selecting a platform that integrated with its existing network spanning 70 countries. The result is dramatically improved performance and significant cost savings. Learn More

The crooks in the cloud
Who's got the biggest cloud in the tech universe? Google? Pretty big, but no. Amazon? Lots and lots of servers, but not even close. Microsoft? They're just getting started. Read More

Online prankster David Thorne
David Thorne doesn't believe in sacred cows. But as a marketing designer, there are lines to be toed and defined boundaries of creativity. So he created the virtual playground 27b/6, where nothing and nobody is safe; co-workers, landlords, police officers and his son and his school's "fat-headed" chancellor are sufficient comedic fodder. He blends merciless wit with shock humour and has won a bet that he can make a viral blog at a drop of a hat. He also has the word 'SHEEP' tattooed on his bicep. Read More

The battle for Internet freedom
What are we permitted to post legally on the Internet? Who is responsible for the content of materials posted on Web sites? Two recent legal cases have highlighted the ongoing battles over control of information being posted on the Internet. Read More

US agencies hot on predicting climate change
The US government is intent on getting into predicting the effects of climate change in a big way. Read More


DOWNLOAD: RIM

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Now.

A case of mistaken identity involving Snopes.com
People tend to get lost on the Internet and I do not mean lost in thought or mindless drivel, though these things are true, too. I mean lost as in they don't know where the heck they are. Read More

Security for mobile devices on the corporate network
WatchGuard Technologies recently published its "2010 Security Predictions." As a follow-up to this paper, we interviewed Corey Nachreiner, WatchGuard Senior Security Analyst, with some follow-up questions to the paper. Read More

As health data goes digital, security risks grow
The amount of online private medical information is expected to grow from terabytes today to petabytes over the next four years, exposing electronic health records to ever more serious data breach threats. Read More

Managing Those Forgotten Mechanical Keys
Keeping track of mechanical keys is an security necessity sometimes overlooked in an access card-oriented workplace. Here are practical ideas for key management. Read More


WHITE PAPER: Polycom

The Art of Teleworking
Does teleworking really work? How can a teleworker be as productive as an employee in the office? This white paper covers the advances in technology that make teleworking successful— and provides solutions for challenges teleworkers may face. Learn More

German government urges users to scrap Firefox 3.6
Germany's federal computer security agency has recommended that users dump Mozilla's newest Firefox browser until the company patches a critical vulnerability later this month. Read More

Why to Quit Facebook And One Reason to Stay On
Last year, Baby Boomers quit Facebook at a faster pace than they joined. Read More

FBI Fights Cybercrime in E. Europe
The FBI is embedding agents in Estonia and Ukraine to help local authorities crack international cybercrime cases. Read More

Pa. school spy case sparks fight over money
Parents representing about a quarter of the high school students in the suburban Philadelphia school district accused of spying on teenagers using their laptops' cameras said they're "outraged" by a lawsuit seeking monetary damages. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Multicore requires OS rework, Windows architect advises
  2. Novell rejects "inadequate" $2 billion takeover bid
  3. Bad BitDefender update clobbers Windows PCs
  4. Mozilla confirms critical Firefox bug
  5. IRS security faults leave taxpayer information at risk
  6. Microsoft lowers Windows licensing costs for virtual desktops
  7. ZeuS botnet code keeps getting better ... for criminals
  8. Latency in the data center matters
  9. Ethernet switches, routers, Wi-Fi on the upswing
  10. Cisco defending its turf on three fronts as markets rebound

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment