Search This Blog

Friday, August 06, 2010

Senate raises H-1B fees to fund border security

  The recent history of governments vs. the Internet | Privacy Wars: How to Hide While Google is Watching You

 
  Network World Daily News PM

Forward this to a Friend >>>


Senate raises H-1B fees to fund border security
The U.S. Senate has approved a large H-1B fee increase to help offset a $600 million "emergency package" to improve security along the Mexican border. Read More
 


VIDEO: Intel

Security: Everyone's Challenge
Making security everybody's job is tougher than ever. You told us so, in a recent quick poll. The top concern: "Making my colleagues aware that security is now everyone's job:" 48%—nearly double the other concerns. But Intel technology is making life a little easier for tech executives. Click here to see how.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. The most recent flap is between BlackBerry maker Research in Motion and two Middle Eastern countries that want to restrict what their citizens can do with their BlackBerry devices. Here are more epic battles between governments and tech companies. Read More

Privacy Wars: How to Hide While Google is Watching You
You know Google is constantly collecting vast information on you, but do you truly know much or how to hide? If you use Gmail, Google knows every email that you ever received, sent, or saved as a draft, even if you deleted it. Read More
 


WHITE PAPER: Palo Alto Networks

To Block or Not. Is that the Question?
There is a serious problem with today's enterprise networks – the users are in control. This paper examines the difficult tradeoffs that IT departments face when determining the appropriate strategy and policies for Web 2.0/Enterprise 2.0 applications. Read now!

Smartphone wave challenges enterprise security
With ever more employees clamoring to use smartphones for both personal and business purposes, IT and security managers are forced to answer tough questions. Read More
 

Blackberry, Windows still own the enterprise but . . .
Consumer buzz tends to center on two mobile phones: Apple iPhone and Google Android. As far as the enterprise is concerned however, these two phones remain down the list. Read More
 


WHITE PAPER: Aerohive

Replace Controllers with Protocols
Learn how a controller-less approach to WLAN keeps costs linear and predictive regardless of network size or deployment type. This architecture provides the capital cost advantages of autonomous APs and the technical advantages of controller-based approaches. Learn more!

News podcast: Network World 360
SAP accepts some liability in Oracle case. Malware found hiding with security company's certificate. Lebanon latest to seek Blackberry data. (2:59) Read More
 

Most popular stories this week: Aug. 6
This week, readers loved the gadgets - from iPad alternatives to back-to-school bargains to spy gadgets. Sleeper hits were our first impressions of Froyo and a piece on IT career rules worth breaking. Check out the full list. Read More
 

Leaked Photos Hint at FaceTime for iPod Touch
Rumors are piling up suggesting the next-generation iPod Touch will get FaceTime video chat thanks to a new front-facing camera. Read More
 

Android 2.2: How to install Flash on Froyo
Support for Adobe Flash is one of the biggest selling points of Android 2.2 - or "Froyo" - and one reason so many people were looking forward to Google's mobile operating system update.  Read More
 

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Microsoft slates record-setting monster Patch Tuesday next week
  2. Cisco firewalls hit again by DoS condition
  3. More than 1 in 10 Mozilla bug finders turn down cash
  4. Android 2.2 on Motorola Droid: First impressions of Froyo
  5. Android 2.2: How to install Flash on Froyo
  6. Google Wave washes out
  7. Smartphones as credit cards: Possibly dangerous, definitely inevitable
  8. Wall Street wants these tech skills
  9. RIM BlackBerry Torch 9800: A visual tour
  10. Hackers find a new target in payroll processing

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: