News podcast: Network World 360 Most IT security woes, from software patching to cyber-espionage and cybercrime, can be traced to the devastating effects wrought by the Top 25 programming errors made in software, according to a broad consensus of government and security firms. A virtualization start-up in stealth mode says it will offer technology that aggregates memory and shares it across servers.(5:08) Ma Bell's 25-year odyssey It's been 25 years since AT&T agreed to spin off its local divisions into seven separate local exchange carriers. Through a series of mergers and acquisitions, the Baby Bells have now consolidated into three major landline companies: AT&T, Verizon and Qwest. In this slideshow, we'll examine the immediate after effects of the breakup as well as the several mergers that have helped partially put Ma Bell back together again. IT Asked and Answered Ron Nutter helps a user get started on understanding PKI. Add to his answer - or post your own question. Network World Community Mitchell Ashley tries out Windows 7, likes what he sees, cautions that XP users will still have to get used to the changes. Ron Barrett explains why Windows 7 will crush Linux. Jimmy Ray Purser discusses rootkit detection. Richard Stiennon writes making security predictions is just too easy. Yoni Heisler ponders whether Apple should be scared of the Palm Pre. Scott Hogg considers IPv6 on your mobile phone. Craig Mathias didn't find much mobile stuff at MacWorld 2009. Avner Izhar considers just how to define VoIP. Tyson Kopczynski explains using Server Authentication certificates with the Remote Desktop Gateway. Michael Morris acknoweldges that passing his CCDE is starting to sink in. Dennis Hartmann tackles DSCP class selectors for QoS. Susan Hanley provides tips for SharePoint searchers. Kerrie Meyler tells Why the Microsoft Solutions Framework is a good tool for System Center. Rick Caccia considers how to tell which employees might be more of a data-breach security risk. Review Citrix, Novell make a valid run at VMware ESX virtualization crown VMware and Microsoft should be running scared when it comes to server virtualization platforms, because open source Xen-based products have matured into viable enterprise-class options. In depth Best practices for removable media encryption USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive corporate information. While IT has responded with policies and audits, the best way to safeguard data taken outside of a managed envrionment is encryption. More news CES 2009: Palm Pre leads gadget parade Palm captured much of the Consumer Electronics Show buzz last week with its "Pre" touch-screen smartphone, complete with a new operating system. Microsoft tried to make noise, too, with CEO Steve Ballmer taking over for Bill Gates as the featured keynoter. Consortium tackles cloud computing standards The Open Cloud Consortium is a newly formed group of universities that is both trying to improve the performance of storage and computing clouds spread across geographically disparate data centers and promote open frameworks that will let clouds operated by different entities work seamlessly together. Apple lacks broad corporate strategy but still sees gains Apple's iPhones and Macs are gaining in the enterprise despite the company's consumer focus. |
No comments:
Post a Comment