Search This Blog

Tuesday, August 17, 2010

Can you guess the vendor who did the funny math?

Google CEO: Change Your Name to Escape Our Watchful Eye | QoS: Ethernet vs. WiFi

Network World Daily News PM

Forward this to a Friend >>>


Can you guess the vendor who did the funny math?
Douglas Gourlay: "In the world of misrepresenting the performance capabilities of a product the networking industry has seen some real gems. Maybe I should recap some of my favorites, a few of which I may have even contributed to before becoming a reformed statistician... But even as much as I would just love to make liberal sport out of the ne'er-do-wells I think this would be much more fun as a guessing game. In the 'Comments Section' below please post your guesses." Read More


WHITE PAPER: Insight

Examine Open Storage v. Proprietary Disk Systems
Download this whitepaper today and examine how Oracle's Sun Storage 7000 Unified Storage Systems offer a complete, open and integrated solution that: * Reduces time to deployment. * Lowers risk. * Simplifies storage deployment and management. Read now!

WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
A solid Active Directory (AD) bridge in your diverse IT environment allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords for improved security and productivity (and reduced complexity and cost). Read More

Google CEO: Change Your Name to Escape Our Watchful Eye
Google is often accused of behaving like Big Brother, and Google's CEO Eric Schmidt isn't doing much to dispel those perceptions. In fact, in an interview with the Wall Street Journal, Schmidt dropped an interesting -- and frightening -- tidbit: perhaps people should change their names upon reaching adulthood to eradicate the potentially reputation-damaging search records Google keeps. Read More

QoS: Ethernet vs. WiFi
Certain networking services work differently on the wired and wireless sides of enterprise networks. One is QoS. Read More


WEBCAST: Red Hat

Modernize Your Infrastructure
In this session, HP and Red Hat speakers will explain how to prepare for and execute an effective migration from SPARC/Solaris OS-based systems to Red Hat Enterprise Linux on HP ProLiant and BladeSystem servers. Register Now!

Back to school tech bargains: Week 3
Don't let the marketing fool you, back to school sales aren't just for students anymore. Read More

IBM unleashes 256-core Unix server, its biggest yet
IBM has strengthened its hand in the Unix business with new systems based on its Power7 processors, including a server for large enterprises that scales to 256 cores. Read More


DOWNLOAD: BlackBerry

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Today!

News podcast: Network World 360
Sometime this month, the 5 billionth device will plug into the Internet. And in 10 years, that number will grow by more than a factor of four, according to IMS Research, which tracks the installed base of equipment that can access the Internet. Also, Verizon has completed a field trial on its fiber-optic FiOS network, in which it delivered bandwidth approaching 1 gigabit per second to business customer in Taunton, Massachusetts. (4:57) Read More

Research: Unusual, Unpopular Passwords Are Simple and Most Secure
Microsoft researchers studied password security and concluded that popularity is everything. Enterprises might be interested to discover that simple but weird is what works as the best way to protect passwords from statistical-guessing attacks. In fact, a study found that popular passwords are easy to guess and pose a bigger risk to online security than weak ones. Read More

Can you choose the right Pen Test?
Pen tests may seem like a security test panacea. However they have been known to go terribly wrong and become vastly expensive. Here's what you need to know to make sure you get the results you want at the price you expect. Read More

Is offering too many products or features a bad thing?
My friend and I got into very interesting conversation the other day about how companies tend to focus a large amount of energy creating products or versions of their products for particular market segments. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. EFF warns of untrustworthy SSL, undetectable surveillance
  2. Microsoft and Google fight over e-mail, but agree on $5 inboxes
  3. Riverbed CEO: Cisco can have Layer 2 and 3, we'll take 4 through 7
  4. Malicious widget hacked millions of Web sites
  5. Social networks leak your information, study says
  6. Five billionth device about to plug into Internet
  7. "Help, I am stranded" scam haunting social networks
  8. How to roll out full disk encryption on your PCs and laptops
  9. Friday the 13th, Part II: Oracle officially ends OpenSolaris
  10. Google Street View disasters

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: