Search This Blog

Friday, September 03, 2010

The most dangerous jobs in technology; Defcon's social engineering test

Women did well on Defcon social engineering test | CodePlex's Walli: No need to overhaul open source definition, licenses

Network World Daily News AM

Forward this to a Friend >>>


The most dangerous jobs in technology
In the world of information technology, some professions are particularly perilous. Whether you're risking psychological stress or your very life, these fields aren't for the faint of heart. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Dallas

Register Now for IT Roadmap Dallas
You're invited to register for IT Roadmap Conference & Expo in Dallas, compliments of Network World! This one-day conference is the most practical, cost-effective way to network with fellow IT executives, gain insights on the latest IT technologies, trend and challenges, and gather relevant solutions you can apply to meet your business needs. Sign up now at no charge!

WHITE PAPER: Brocade

Top 3 Best Practices for Virtualization Management
Get virtualization right and make the most of your investments in the technology. Download this whitepaper today and examine the top 3 best practices for virtual infrastructure management. Read now!

Women did well on Defcon social engineering test
Organizers of a recent Defcon social engineering contest will release their results next week. One conclusion is that women did well in protecting corporate secrets. Read More

CodePlex's Walli: No need to overhaul open source definition, licenses
Julie Bort: As long as Microsoft exists, there will be those who believe it's the KGB of the open source world, secretly doing everything it can to destroy FOSS. The CodePlex Foundation's Stephen Walli tries to dispel that notion. Read More

Buzzblog: Kindle owner on her continuing love of 'real' books
Slate today has an anti-Kindle rant from a 26-year-old fellow and I must say that I found his reasoning not all that compelling. However, a comment on the piece from a Kindle owner does fit nicely into my own thinking about the future of print, so I thought I'd share it with you here. Read More


WHITE PAPER: Xerox

Xerox Enterprise Print Services: improved business results
Xerox has the tools, methodologies and experience to help reduce your total cost of ownership by up to 30% or more. We give you complete control over your enterprise print infrastructure and provide full transparency of all internal and external print-related spend. Read Now.

NASA preps ultimate Sun mission
NASA today said it had picked five experiments that will ride aboard one of its most ambitious space missions to explore the Sun. Read More

Hurricane tracking apps for iPhone and iPad
If you've been paying a lot of attention to Danielle, Earl, and Fiona lately -- no, you won't find pics of them on TMZ.com -- then a hurricane-tracking app, built specifically for your iPhone, iPod touch, or iPad, may help feed your curiosity about storms. Read More

Microsoft uses Bing home page to push IE8
Microsoft on Thursday started featuring a small advertisement on its Bing home page for Internet Explorer 8 in an apparent effort to encourage more people to migrate to the latest version of its browser. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Latest Skype beta offers group video calls for 10
The latest beta version of Skype offers the ability to do group video calls with up to 10 people. Read More

Security program automatically tracks down missing patches
Secunia has updated its Personal Software Inspector (PSI) with the ability to silently download and apply patches from multiple vendors soon after their release. Read More

Virtualize your browser to prevent drive-by malware attacks
Does Web browsing make you fearful of picking up a virus or downloading malware? It won't if you do your browsing in a virtualized environment on your desktop. Invincea Browser Protection uses virtualization technology to separate untrusted content coming from the Web from the rest of your desktop and network. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. Burning Man's open source cell phone system could save the world
  2. U.S. spends $11M to kick-start video search technology
  3. Microsoft to VMware: Windows is still relevant in the virtualization era
  4. VMworld 2010: Virtualization, The Matrix, VMware/Microsoft rivalry
  5. Eight great virtual appliances for VMware, free for the downloading
  6. The new iPhone that's not a phone: the latest Wi-Fi only iPod touch
  7. Botnet takedown may yield valuable data
  8. Brocade set to take Cisco, Juniper on in 100G
  9. Brocade set to unveil 100G Ethernet
  10. 6 useful Wi-Fi tools for Windows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: