Search This Blog

Friday, May 08, 2009

Bill would turn Internet flamers into felons; Ubiquitous GPS coverage could get spotty soon

How to secure your home network; Cisco employee share-based compensation expense defies gravity
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Dell
rule

The Importance of Application Management
Efficient desktop application management is essential in normal day-to-day operations of any company. Whether you are introducing a new application or implementing an OS migration, the goal is the same: minimize disruptions and ensure user productivity throughout the process.

rule

Spotlight Story
Bill would turn Internet flamers into felons

John Cox By John Cox
A little-noticed bill re-introduced in Congress last month would make the use of popular electronic communications a felony if "the intent is to coerce, intimidate, harass, or cause substantial emotional distress to a person." Read full story

Related News:

News podcast: Network World 360
A little-noticed bill re-introduced in Congress last month would make the use of popular electronic communications a felony if "the intent is to coerce, intimidate, harass, or cause substantial emotional distress to a person." Also, at least 340 of the estimated 500 public companies required by the U.S. Securities and Exchange Commission to begin filing financial data in the XBRL format in June have made the conversion, according to a survey from a nonprofit standards group. (6:10)

Ubiquitous GPS coverage could get spotty in near future
Global Positioning Systems have become ubiquitous, with support for the satellite-based system in everything from cell phones to cars. The system too has become a vital part of day-to-day activities from coordinating Coast Guard rescues and 911 calls to scheduling intercontinental flights. But don’t take it for granted too long as its ubiquity might go away in the next few years.

Network World is on Twitter, you know.

MIT recognizes startup Ksplice for rebootless OS updates
Ksplice, a Cambridge, Mass., startup whose software is designed to help computer users keep their operating systems secure and updated without the hassle of frequent...

How to secure your home network
Reader Steve Hawley is all too typical. His home network houses a mix of Macs and Windows PCs, an old 802.11b Linksys router connected to a cable modem, and a couple of Airport Expresses connected to sound systems around the house. He wrote to us, seeking some advice on how to configure that network.

Oracle will stay in the hardware business, Ellison says
Oracle plans to stay in the hardware business following its planned $7.4 billion acquisition of Sun, CEO Larry Ellison has said, adding more detail to earlier statements made by the company.

Cisco employee share-based compensation expense defies gravity
Reese: For the first 9 months of FY09, Cisco employee share-based compensation expense defied gravity by climbing to $835 million (a $68 million increase).


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

The Importance of Application Management
Efficient desktop application management is essential in normal day-to-day operations of any company. Whether you are introducing a new application or implementing an OS migration, the goal is the same: minimize disruptions and ensure user productivity throughout the process.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/08/09

Today's most-read stories:

  1. The Internet sky really is falling
  2. Death of the mouse
  3. 10 tech-inspired Mother's Day gifts
  4. As economy softens, Microsoft ramps up research
  5. FutureNet 2009: IPv6 coming, ready or not
  6. Despite pledge, researchers release VBootkit 2.0 code
  7. Multi-gigabit wireless spec on tap by year-end
  8. Top 7 reasons people quit Linux
  9. Obama tax plan bad for Cisco, other offshorers
  10. Study: U.S. air traffic control vulnerable to cyberattack
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: