Thursday, May 07, 2009

10 tech-inspired Mother's Day gifts; Researchers release code despite promise; Top 25 most-read

Virginia Dept. of Health: Prescriptions database breached but not deleted; This week's 25 most-read stories
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Spotlight Story

10 tech-inspired Mother's Day gifts
By Ann Bednarz
If you're looking for a gift for your mom -- or something for your kids to give their mom -- check out these nine tech-inspired options. You'll find something for all budgets and levels of effort. There's even a Tetris-inspired ice cube tray. View slideshow

Related News:

News podcast: Network World 360
Intel plans to stop selling one of its high-end desktop chips this year, less than one year after it was released, the company confirmed Thursday. Also, a security researcher said Wednesday that a long-running Microsoft practice puts users at risk with the new Windows 7 Release Candidate. (5:39)

Despite pledge, researchers release VBootkit 2.0 code
Indian security researchers have released proof-of-concept code that can be used to take over a computer running Microsoft's upcoming Windows 7 operating system, despite earlier promising not to make the code public for fear it could be misused.

Virginia Dept. of Health: Prescriptions database breached but not deleted
The Virginia agency in charge of an online medical-prescription database acknowledged a potential data breach of it may have occurred by refuted the notion that the entire...

GE to spend $6 billion on health tech initiative
General Electric will spend $6 billion over the next six years in an effort to improve healthcare quality and drive down costs to consumers, the company announced Thursday.

Video: Can a Bug save the world?
Human Rights Watch is trying to get funding for a project that would equip the group's observers with the BUG so they could do things like measure the use of chemicals in global conflicts.

This week's 25 most-read stories

1. Death of the mouse
2. The Internet sky really is falling
3. It Takes a Village Idiot: The Jerks of Online Forums
4. Illinois programmer sues Google over "Android"
5. Why BlackBerry Still Beats iPhone For Some
6. Is it time to cut the Ethernet access cable?
7. Domain name company cries croc tears over 'censorship'
8. RIM to bind BlackBerry to Cisco phones
9. Use the Cisco restroom at your own risk
10. Juniper bolsters branch router, switch lines

11. Top 7 Reasons People Quit Linux
12. Seven things to love, hate about Windows 7
13. Citrix embraces Apple with iPhone virtualization, app store for corporate IT
14. 12 killer freebie SharePoint add-ons
15. Evolution of Ethernet
16. Why mix Bluetooth with Wi-Fi?
17. Microsoft aligning management, clouds
18. Viva La Mouse! Mouse innovations that we've loved
19. Apple iPhoneys: The 4G edition
20. Botnet probe turns up 70G bytes of personal, financial data

21. Eliminate network gear maintenance fees to save big money
22. Sun storage system delivers high performance
23. Give users passwords they don't have to remember
24. Top 10 technology skills
25. Some IT skills see pay hikes during downturn

Today on Google Subnet
Twitter looks to shake up search; The not-so-green side of Google; Dell likes Android for netbooks too; and Jon Rognerud: The #1 Way To Love Yourself More: Use Google!


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Compare Network Management Products
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Network Management Product Guide.
Visit now

 

05/07/09

Today's most-read stories:

  1. The Internet sky really is falling
  2. Utility's plan to lessen fire risk it caused?
  3. Sweden may prosecute Cisco hacker
  4. Death of the mouse
  5. Why BlackBerry still beats iPhone for some
  6. Top 7 reasons people quit Linux
  7. Increasing Internet security for average users
  8. IPv6 security guru fields questions
  9. Domain name company cries croc tears over 'censorship'
  10. Holy Grail VMware bug: jump through a Windows VM, control the host
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment