Search This Blog

Monday, August 09, 2010

The price of free Internet: a piece of your soul

Privacy Wars: How to Hide While Google is Watching You | Open source, the demo-meritocracy

Network World Voices of Networking

Forward this to a Friend >>>


The price of free Internet: a piece of your soul
It is not news that there are a lot of companies, and maybe a few governments, tracking your every move on the Internet. But most people have not yet internalized just how pervasive and detailed the tracking is. Read More


WEBCAST: Infoblox

Learn 4 Concepts to Network Automation
Join this webinar to learn where to start introducing network automation into your organization so you can: • Address Hidden IT Costs • Support Key Initiatives • Achieve Operational Optimization • Apply IT Resources More Strategically View Now!

WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Privacy Wars: How to Hide While Google is Watching You
You know Google is constantly collecting vast information on you, but do you truly know much or how to hide? If you use Gmail, Google knows every email that you ever received, sent, or saved as a draft, even if you deleted it. Read More

Open source, the demo-meritocracy
Is open source more democratic or meritocratic? You could make a convincing case for either one but, like a lot of things in life, it's probably somewhere in between. Consider open source's characteristics. Read More

IT security auditors are NOT evil and could keep you from getting hacked
As I sit here writing my first blog entry, while attempting to recover from a week in Las Vegas spent taking in the sights, sounds, and insanity that only Black Hat and DEF CON can inflict on a mere mortal (robots and ninjas are immune, or so I have been told), I can't help but to be amazed by how many security issues could be prevented with a strong security auditing and assessment program. Read More


WHITE PAPER: Aerohive

Replace Controllers with Protocols
Learn how a controller-less approach to WLAN keeps costs linear and predictive regardless of network size or deployment type. This architecture provides the capital cost advantages of autonomous APs and the technical advantages of controller-based approaches. Learn more!

Google Wave drowns, washes out, crashes out, goes out with the tide, etc. etc
Not that anyone in the press was actually rooting for the much hyped Google Wave to fail, but that doesn't mean the media wasn't more than happy to flex its headline writing muscle when Google did announce yesterday it wouldn't develop Wave as a standalone product. Read More

GPL Has Some Bite Behind It
For many years there was a question about how the court system would view the provisions of the GPL license in regard to the use of open source software. Frankly many cases were settled prior to a decision being rendered in order to lessen the possibility of an adverse ruling. Read More

Contribute or Be Shamed
I came across an article titled "Does Ubuntu Contribute its Share to Free Software Projects? and thought I would share the issue with my readers to see what your thoughts on contribution expectations are when considering open source projects. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

Confronting a lazy vendor
This kind of thing doesn't happen often, but after blogging last week I found myself in a meeting with a vendor who is definitely one of the ones I was complaining about. Read More

Do you still love your job?
A while back we were lucky enough to go see Weird Al in concert here in Dallas. And to say the least he puts on such an excellent show it's hard to convey to you all... but of course I was raised on Weird Al so I'm biased. Now I know this doesn't seem to have anything to do with DBs, but it does I promise. Read More

Sorry Charlie, All Web Apps Can Be Insecure, Not Just Open Source Ones
At the recent Black Hat security show in Las Vegas, SaaS vulnerability management company Qualys announced a new open source security tool called Blind Elephant. The tool is open source and is used to fingerprint specific versions of web apps and plug ins. Read More

Will Future Virtual Intelligence & Precrime Predictions Kill Privacy?
If crime could be stopped before it started, by use of virtual intelligence "future" searches, what might be the cost to privacy and online anonymity? Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Microsoft slates record-setting monster Patch Tuesday next week
  2. Cisco firewalls hit again by DoS condition
  3. More than 1 in 10 Mozilla bug finders turn down cash
  4. Android 2.2 on Motorola Droid: First impressions of Froyo
  5. Android 2.2: How to install Flash on Froyo
  6. Google Wave washes out
  7. Smartphones as credit cards: Possibly dangerous, definitely inevitable
  8. Wall Street wants these tech skills
  9. RIM BlackBerry Torch 9800: A visual tour
  10. Hackers find a new target in payroll processing

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: