A guide to Microsoft's dizzying array of desktop virtualization options Microsoft offers no fewer than five desktop virtualization technologies -- depending on how you define the term. We chart the options. iPhone 3G vs. Palm Pre Does Palm Pre knock the iPhone 3G off its design throne? We take a look, side-by-side. Cisco losing share across the board: analyst Cisco lost share across several markets in Q1, most dramatically in SANs, according to investment firm UBS. The firm suggests the backwards steps might be due to company distraction. Cheerleader for new domain names defends ICANN plan Plans to introduce new top-level Internet domains will not force trademark owners to make defensive registrations to protect their brands, according to two reports published by ICANN on Saturday. Verisign urges careful check of cloud security SAS 70 - the auditing standard used by CPAs to evaluate the processing of transactions - is emerging as one of the key ways to evaluate cloud service provider security. The need to consider a router's power efficiency metrics At the recent Interop conference, Jim moderated a highly interactive panel that was entitled "Is Routing Undergoing a Mid-Life Crisis?" This is the third in a series of newsletters that is based on that panel and which continues the discussion of routing and the identification of what if anything is driving the need for IT organizations to rethink their approach to routing. Internet Cleanroom: New weapon against drive-by download attacks emerges As more employees visit social networking sites while at work, network managers are seeing a rise in accidental malware infections known as drive-by download attacks. White House plan to create 600K jobs in 100 days won't help tech The impact of the nearly $800 billion stimulus package on shrinking IT employment remains in the future, despite President Obama's plan to expedite hiring of some 600,000 people over the next 100 days. Social Engineering: 5 Security Holes at the Office If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside? Social Engineering: The Fine Art of BS, Face to Face Social engineering expert Chris Nickerson reveals what criminals are looking for when it comes vulnerabilities in building security. June Giveaways Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30. |
No comments:
Post a Comment