Monday, August 23, 2010

Oracle to Open Source: Drop Dead!

Who's the HOTTEST video game chick? | Intel buys McAfee: My two cents

Network World Voices of Networking

Forward this to a Friend >>>


Oracle to Open Source: Drop Dead!
Lets face it. While everyone in open source for the last 10 years has been beating up on Microsoft about being public enemy #1, there has been another large software company whose record is even worse. With the purchase of Sun and the dismantling of the foundational open source projects that Sun sponsored, Oracle and Larry Ellison have show their true colors. Read More


WEBCAST: Infoblox

Learn 4 Concepts to Network Automation
Join this webinar to learn where to start introducing network automation into your organization so you can: • Address Hidden IT Costs • Support Key Initiatives • Achieve Operational Optimization • Apply IT Resources More Strategically View Now!

WHITE PAPER: HP

Setting Up a Seven-Figure IT Cost Avoidance at JEA
Learn how storage acquisition costs are 67% lower, performance is faster, recovery takes minutes instead of days, and a seven figure cost avoidance lies ahead. Read Now

Who's the HOTTEST video game chick?
I asked my son what I thought was a simple question: "Who is the hottest video game chick?" My son went into this deep discussion on certain qualities and looks as well attitudes that made certain video game females more attractive to him. This was like my graduating from Harvard moment for me. I was so proud. The results were different for both of us. Read More

Intel buys McAfee: My two cents
Before the bell rang on Wall Street, Intel shocked the army of Latte sipping financial wonks by announcing its intentions to buy security leader McAfee. The deal is valued at $7.7 billion or $48 per share, about a 60% premium on the stock price. A few financial analysts who cover Intel say that this is about Intel's mobile device aspirations. Maybe. Read More


WHITE PAPER: HP

Implementing Tiered Storage:
IDC: Enterprises that are investigating deploying a tiered storage architecture should consider using an external services provider to assist with the migration. Of critical importance is the ability to offer a range of services from the initial planning all the way through to ongoing support and management. Read Now

Puppets are back! U is for Unified Communications
We couldn't just give up with one letter, so we decided to jump around the alphabet, and our pals I.T. Jinglehopper (you can just call him Neal) and Jackson are happy to provide a tutorial on the exciting world of unified communications. Read More

The Audacity of Warner Brothers and Re-Spawning Zombie Cookies
Have you ever played a first-person shooter (FPS) deathmatch game, where immediately upon death, you instantly are reborn, aka re-spawn? In gaming, I think it's fun. In regards to privacy, I'd like to take my FPS gun and shoot into cyberspace at zombie cookies. Read More


WHITE PAPER: HP

Virtualize your end-to-end IT infrastructure
A virtual storage infrastructure available only from HP can double your capacity utilization and cut management costs in half with innovations that unlock trapped capacity in individual servers or in enterprise disk arrays. Learn how. Read Now

Who are these people who think cybersecurity experts are crying wolf?
It happened again Monday that a news report about the threat of cyberattacks was greeted with skepticism. It's happened in the wake of some of my previous posts on the subject that commentors said the security experts warning of the threat are only scaring people in order to sell their security products and consulting services. Read More

Is offering too many products or features a bad thing?
My friend and I got into very interesting conversation the other day about how companies tend to focus a large amount of energy creating products or versions of their products for particular market segments. Read More

Support remains the weak link in open source software adoption
Acceptance of open source by IT professionals continues to increase, according to a recent survey that shows the slumping economy helped boost that trend. Read More

Curriki: Bringing the open source model to education
Not only can free, online, open-sourced curriculum and books make education more affordable and widespread - it also can make it fun. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment