Search This Blog

Monday, April 26, 2010

Is network security a dead-end career?

Network World Voices of Networking - Newsletter - networkworld.com
The future of open source is in the middle | Cisco's move to open-source its Telepresence is genius

Network World Voices of Networking

Forward this to a Friend >>>


Is network security a dead-end career?
Hard to believe that I ever thought I would be sitting here wondering about the state of security as a viable career path. I have built my career up as a security dude/hacker for years, but lately I have been noticing a few things. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

WEBCAST: HyTrust

8 Tips for Virtualization Under Control
Examine 8 tips that will show you how to virtualize more critical workloads with confidence. From security planning and policy management to automation and access controls, get expert advice on how to build a more secure virtual infrastructure to accelerate the virtualization of business-critical applications. Learn More!

The future of open source is in the middle
Open source, Erik Troan emphasizes, is not a business model. It's not an economic model. It's not a technological model.It's a set of value propositions. It's a community. It's a foundation upon which - gasp! - even proprietary programs can be built. Read More

Cisco's move to open-source its Telepresence is genius
Though Cisco was simply fulfilling a legal requirement when it announced this week it would release the code behind its Telepresence Interoperability Protocol as open source, it surely struck some as baffling. And struck others as good business sense. Read More

Four Considerations When Using Open Source in Production
Most IT staff and developers have no problem technically evaluating open source software. However, they often overlook other considerations that could mean success or failure of a production system. Here are some of the top non-technical issues you should consider for any open source that will be running in your production environment. Read More


WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

Change We Can Believe In - The White House Develops Open Source Code
The White House as part of their effort to have the whitehouse.gov site on an open platform today announced that they have contributed several modules and code they have developed under an open source license back to the Drupal community. Read More

More comms hell
Gibbs is trying to get back on the 'Net after moving house … AT&T isn't making it easy. Read More

Will Cloud Lead to the Failure of VDI?
I've said it before, but it bears repeating: VDI is not desktop virtualization. It is one of many deployment models that may fit into an overall desktop management strategy; but hang your hat on VDI alone and plan to fail. Read More


WHITE PAPER: Aerohive

Understand the Network Impact of 802.11n
As performance and reliability increase with 802.11n, the WLAN becomes a viable alternative to the wired network for mission- critical applications. This paper outlines the drawbacks of centralized controller-based approaches and how they will provide unavoidable roadblocks when faced with the increases in bandwidth provided by 802.11n. Read More!

Gizmodo, "iPhone 4G," and the new "new journalism"
Gizmodo proved that it will indeed do "anything for a story" by its involvement in the "iPhone 4G" controversy.Two weeks ago, I got out of my car in the parking lot of a business supplies store and looked down: there was a cell phone lying on the pavement. Read More

Why do I refuse to buy anything from Apple? Because they are evil!
I'm sure my Apple loving friends are going to give me a hard time about this post. But, I can't just simply stand around anymore and watch everyone drink the poison laced Kool-Aid. Come on people, I surely cannot be the only person to see the "Evilness" that now embodies Apple. Read More

Juniper attempts to lure new customers with the old switcheroo
Juniper Networks today announced a program to discount its EX Series branch offices switches by about 60 percent for new customers trading in old gear from "legacy" suppliers. The offer isn't open to folks who already own Juniper switches, though it is to Juniper customers of other products, like security, that haven't yet tried its switches. Read More

Reader answers last nagging question re: iPhone/9:42
A post here April 7 finally got almost to the bottom of a three-year mystery by explaining that most every promotional photo of the iPhone carries the precise time 9:42 because that was the time Apple first unveiled the gadget publicly and the company wanted to make sure that the time on the picture shown on stage matched the time on the watches of audience members. Trivial matter, you say? Read More

25 years later: How the 'Net would have prevented New Coke
Let's rewrite history: It was 25 years ago tomorrow, April 23, 1985, that the world's most famous soft drink company committed arguably the world's most famous product development/marketing gaffe: New Coke. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Confessions of tech hoarders
  2. Google, YouTube received 10,000 gov't requests for user data
  3. McAfee apologizes for PC anti-virus snafu
  4. McAfee's DAT 5958 debacle goes on
  5. Steve Jobs: Savior or tyrant?
  6. 5 hot IT certification picks for 2010
  7. Cisco's move to open-source its Telepresence is genius
  8. Flawed McAfee update paralyzes corporate PCs
  9. Recovering from the flawed McAfee update
  10. Other top-secret Apple projects found at a bar

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: