Wednesday, July 28, 2010

A better security conference open source style; U.S. military adopts more open source

  U.S. military adopts more open source: is that secure enough for you? | Shimel's 10 Commandments For Open Core
 
  Network World Linux and Open Source

Forward this to a Friend >>>


A better security conference open source style
Alan Shimel: Today I want to tell you about a different kind of open source security conference. It is an open source modeled event on security: BSides. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Nimsoft

Optimizing Performance in Virtual Infrastructures
Know the memory, storage and networking keys to improving performance and availability. Read more.

U.S. military adopts more open source: is that secure enough for you?
Julie Bort: The U.S. military and researchers at the Georgia Institute of Technology are putting their heads together to help the military adopt more open source software. Read More

Shimel's 10 Commandments For Open Core
Alan Shimel: There has been a lot of discussion recently over so called "open core" business models. Many people don't like the term, but the underlying principles are still valid. Read More

Celebrating a year of pushing the Feds toward open source
Amy Vernon: To celebrate a year of championing the use of open source software in the U.S. government, Open Source For America has created an awards program to recognize those who took up the challenge. Read More

Snort and Suricata Creators Exchange Heated Words
Ben Whaley: Matt Jonkman and Martin Roesch have had a rough week lobbying serious accusations at each other and leaving the rest of us confused over the future of IDS. Read More


WHITE PAPER: Red Hat

Detailed Planning Guide: SAP to Red Hat Migration
Lower costs and improve performance migrating SAP to Red Hat Enterprise Linux. Download this guide today and discover how you can perform a basic installation and migration in less than 1 day. Examine pre- and post-migration considerations and other upfront planning topics to help avoid potential problems. Read more

Get them while they're young
Eric Gries: Ashlee Vance recently wrote a good piece in the New York Times that touched on a concept well-known to every major company catering to consumers or other mass markets: Try to get them when they're young. Read More

Google Android Market looks to protect apps
A new licensing service is intended to prevent unauthorized use of Android apps Read More

Open source Razorback project targets malware, zero-day exploits
Sourcefire, best known for its Snort intrusion-prevention technology, Tuesday is unveiling a new open source project called Razorback that's designed to spot malware and especially zero-day exploits. Read More

5 ways to use ebootable Linux live discs
Redeploy aging hardware with Linux to offer these five services. Read More


WHITE PAPER: Red Hat

Red Hat Enterprise Linux: Your Solaris Alternative
With the improved price, performance, and reliability of industry standard x86_64 servers, buying SPARC hardware has become less compelling. Red Hat® Enterprise Linux has emerged as the OS of choice with its open, industry-standard architecture. Read More Now

Dell drops Ubuntu option from website
Despite previously claiming that Linux systems are safer than those running Windows, PC maker Dell has stopped selling computers pre-installed with the Ubuntu operating system via its website - the principle source of orders for the company Read More

Google executive frustrated by Java, C++ complexity
Today's commercial-grade programming languages -- C++ and Java, in particular -- are way too complex and not adequately suited for today's computing environments, Google distinguished engineer Rob Pike said. Read More

Drupal Gardens getting ready to bloom
Hosted version of the open source CMS moves to public beta stage Read More

Visit the Open Source Subnet home page
Visit the Open Source Subnet home page for daily news items, blogs, discussions and podcasts of interest to enterprise open source users. Follow Open Source Subnet on Twitter @OSSubnet. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment