Tuesday, March 08, 2011

Tech Debate: Net neutrality, needed or not?

8 essential Android security apps | 'Food porn' at its best: Ex-Microsoft CTO publishes groundbreaking cookbook

Network World Daily News PM

Forward this to a Friend >>>


Net neutrality, needed or not?
Network neutrality regulation is necessary, proponents say, to ensure that ISPs treat all traffic in a neutral fashion and don't try to enrich themselves by meddling with the bits. Poppycock, naysayers respond. Service providers have always behaved and there is no reason to introduce regulations that could slow down this critical engine of commerce. Read More


WHITE PAPER: Siemens

Finding the Value in Unified Communications
This paper examines the four stages of return companies can see from their UC investments: Lower communications costs are followed by lower operational costs, then better productivity, and finally a true competitive advantage. Read More

WHITE PAPER: Polycom

Learn 6 key best practices for successfully implementing UC.
Discover which strategic design and other considerations play critical parts in achieving your ROI objectives. Learn how to develop an implementation strategy that reflects the needs of your organization. Read now.

8 essential Android security apps
A DIY guide to securing Android-based devices Read More

'Food porn' at its best: Ex-Microsoft CTO publishes groundbreaking cookbook
The $625 'Modernist Cuisine' cookbook is laden with spectacular photography that captures cooking techniques and chemical reactions such as the Leidenfrost effect. Read More

Cyberattack-alert system could be model for U.S.
An ambitious project to create a statewide cyber-alert "early warning" system in the state of Washington to link with the federal Dept. of Homeland Security (DHS) is starting to take shape and could be a cybersecurity monitoring model for other states. Read More


WEBCAST: IBM

Solving the Top 4 Network Management Challenges
Join us for this webinar, featuring Jim Frey, Research Director from Enterprise Management Associates (EMA) and Heath Newburn, Program Director from IBM as they discuss Netcool's flexible solutions for a complex and dynamic IT environment. Learn More

4 ways to have fun with IP addresses
Why so serious? Here are a few ways to have some fun with your IP address.Look, I know that the pool of IPv4 addresses running out is a serious topic that requires a serious solution, and we should all be moving to IPv6 as soon as possible. But before we shelve those old IP addresses, let's take a look back at a few ways folks have had some fun with them. IP Spotting Read More

IBM's Sam Palmisano dunks over Lebron James
From the 'One-on-ones You'll Never See Department'Sam Palmisano is a former high school offensive lineman who has the hops of a 59-year-old white guy, yet the IBM CEO posterized Lebron James yesterday with the revelation that he earned $31.7 million in total compensation last year, up 30 percent over 2009. Read More

Internet Access at 30,000 Feet
Michael Morris: I had my first experience with airplane Wi-Fi this week on a trip to California. Since it was only $5, I gave it a shot. Read More


WHITE PAPER: Nastel Technologies

Control & Automate Application Performance Management.
This report by Forrester Research discusses how to handle IT complexity using application performance management converged with Complex Event Processing to produce a closed-loop automation solution for application management. Learn More

Microsoft warns of Windows Media video attacks on Patch Tuesday
Hackers could use malicious video files to take over Windows computersMicrosoft issued three security patches for Windows and Office today, including a critical bug fix for Windows Media Player and Windows Media Center. The Windows Media flaw, if left unpatched, lets attackers target victims with malicious video files.  The malicious files can't automatically take over a victim's computer, so the hacker must perform some social engineering to trick the user. Read More

Researchers unmasking anonymous email senders
Just because you send an email anonymously doesn't mean people can't figure out who you are anymore. Read More

Researcher blows $15K by reporting bug to Google
A security researcher lost a sure $15,000 at this week's Pwn2Own hacking contest because he had earlier reported the bug to Google, which has patched the vulnerability in its Android Market. Read More

VMware aims give users more control with vCenter Operations
VMware is integrating performance, capacity and configuration management with the launch of vCenter Operations, in an effort to give users more control over growing virtualized IT infrastructures, the company said on Tuesday. Read More

Adobe's Wallaby ties Flash to HTML
The toolkit converts Flash files to HTML so that they can run on Apple's iOS or WebKit-based browsers Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. iPhone 5 to sport aluminum back, redesigned antenna, A5 chip
  2. Wells Fargo says no to personal smartphones and tablets
  3. Go for it on fourth down? Ask Coach Watson
  4. Perks drive up pay for tech CEOs
  5. Google throws 'kill switch' on Android phones
  6. IPv6 on home routers and DSL/cable modems: FAIL
  7. Is your company at risk of an IPv6 brain drain?
  8. The DDoS hall of shame
  9. Verizon: We have plenty of IPv4 addresses
  10. New security tools protect virtual machines

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment