Who Should Own the Enterprise Handset? Farpoint Group has historically taken the view that enterprise handsets, like all other elements of enterprise IT, should belong to the enterprise. This is based on the observation that one cannot manage what one cannot secure, and one cannot secure what one does not own. Security must be paramount in essentially every enterprise, but, let's face it... Gartner gives data center energy-saving tips In anticipation of its Data Center Conference starting tomorrow, Gartner predicts that energy, space and technology problems will worsen in 2010 and that IT managers will need to find pragmatic ways to deal with them. Data-leak lessons learned from the 'Climategate' hack In case you've missed it, someone recently dumped a large cache of e-mail files and documents from the University of East Anglia's prestigious Climatic Research Unit onto the 'Net. The CRU is one of the leading climatology research institutions, and its data and models provide much of the infrastructure on which the theory of anthropogenic global warming (AGW) is based. The broadband gap: Is FCC grabbing for the wrong tool? Columnist Scott Bradner tries to make sense of what the FCC is up to in addressing the broadband service gap in the United States. Users don't buy Microsoft's Exchange 2010 savings claims Users are not buying into Microsoft's savings claims about Exchange 2010 and most are expected to drag their feet in upgrading to it for a good two years. Holiday gift ad for Dragon NaturallySpeaking proves tone-deaf Listen up, kids: Don't bother learning how to type; play more video games instead!That's the cheery message from the makers of Dragon NaturallySpeaking being delivered to radio listeners in Boston, Chicago, Philadelphia, Seattle and San Francisco this holiday season. And a full-throated "bah, humbug" it deserves. The Apple Tablet is the most intriguing Apple product since the iPhone, and may prove to be just as revolutionary Before Steve Jobs introduced the world to the iPhone at Macworld 2007, the device was the subject of incessant and countless rumors, yet no one really had a firm grasp on what the iPhone actually was. In a similar vein, rumors of the impending Apple tablet seem to be picking up steam, and much like the iPhone, well-formed ideas as to what the device is actually capable of remain blurry at best. Grab the Tiger by the Tail One challenge with open source projects is finding people to fix the bugs. After all, bug-fixing is supposed to be an easy way to get developers started contributing to a project. But people sometimes forget that bug fixing, like anything in open source, inevitably involves "scratching your own itch", in one form or fashion. Net Management and the Cloud EMA has just recently completed the data gathering phase of our Responsible Cloud research initiative, and there are some interesting results around the roles being played by network management and networking teams in terms of cloud management and operations. True Security Requires Extensive End-User Training I am writing this column on my company-owned laptop while sitting on (mighty uncomfortable) bleachers in a middle-school gym waiting for my daughter's basketball game to start. This is nothing unusual in this era of the virtual workplace. Today from the Subnet communities On Cisco Subnet: Cisco has 84% of Tandberg locked up and The VEPA standard -- a potential game changer?; On Microsoft Subnet: Fake Microsoft security e-mail spreads malicious code; On Google Subnet: Google releases free public DNS Network World on Twitter? You bet we are |
No comments:
Post a Comment