How the feds are dropping the ball on IPv6 U.S. federal agencies have six months to meet a deadline to support IPv6, an upgrade to the Internet's main communications protocol known as IPv4. But most agencies are not grabbing hold of the new technology and running with it, industry observers say. Review Taming the virtual beast: Part II In this second of three test pieces focusing on virtual machine management, Network World Lab Alliance member Tom Henderson reviews three commercial products and one open source project that all take a different route to controlling a piece of the overall problem of managing large scale virtual machine deployments. Network World Community Mitchell Ashley explains how Rick discusses the virtualization problem: Virtualization and regulatory requirements such as Sarbanes-Oxley may not mix. Microsoft can save Vista and Windows Server 2008 and wonders if there really is a Microsoft Live Workspace beta. Tyson Kopczynski discusses PowerShell and WinSCP. Susan Hanley explains where you might want to use folders in SharePoint. Kerrie Meyler begins to answer the question: What is DSI? Brad Reese ponders the 200-page Cisco document that nobody reads, but everyone spends four months arguing about. Michael Morris claims victory in the war to get Cisco to give out better bags at conferences. Jamey Heary talks about the iPhone and Cisco VPN gateways. Wendell Odom estimates the time it takes to prep for both the CCVP QoS and CIPT exams. Patrick Regan looks at how to study for a certification exam. Joe Chapman helps you decide on metro Ethernet services. Mark Lewis shows how to prevent IPSec VPN failures. Mark Gibbs rails against the recording industry and explains how KDE makes Windows look bad. Google Gal looks at Google's new Webmaster tools. James Gaskin tells you why the holidays are a time to be especially vigilant about thieving employees. Craig Mathias ponders where wireless apps should live. Adam Gaffin considers people who really hate Twitter. How to Ron Nutter helps a user build a VPN with Cisco ASA gear. In depth Properly handling end-of-life IT assets With major OEMs arguing about who recycles the most electronics and with e-waste legislation on the rise across the world, green computing is a hot topic. However, many companies are still in the dark about how to properly get rid of old IT equipment in an environmentally friendly way that also ensures the secure destruction of sensitive data. More news Cisco's virtualization a multiyear investment Customers should count on spending three years to completely implement Cisco's Data Center 3.0 architecture, company officials said this week at the C-Scape 2007 conference. Two wireless LANs better than one, Carnegie Mellon says Instead of one WLAN vendor, Carnegie Mellon University chose two for its campus-wide 802.11n wireless network. Energy companies face costly upgrades to secure electric grid The nation's electric power grid needs better computer security for its industrial control systems to prevent attackers, sabotage or just simple unauthorized use, according to the Washington-based agency the Federal Energy Regulatory Commission. Many in the energy industry expect FERC to issue new security rules this month, but will demands such as patching and antivirus simply be too much for the nation's existing electric-power control systems? |
No comments:
Post a Comment