Search This Blog

Thursday, September 08, 2011

Justifying spontaneous computer seizures

  Three Top Open Source Bug Tracking Apps | More than two decades after inventing the Web, Berners-Lee fights to keep it open
 
  Network World Security Strategies

Forward this to a Friend >>>


Justifying spontaneous computer seizures
In the previous article in this column, we looked at the fundamental exclusion of border-crossing regulations from constitutional protections against arbitrary search and seizure. Today we continue the examination of the issue of arbitrary search and seizure at the borders of the country. Read More


WHITE PAPER: BMC

How SaaS Can Benefit the IT Help Desk
Small and midsize businesses that are using software as a service (SaaS) to automate their IT help desk(s) and IT infrastructure are reporting significant savings. Read More!

WHITE PAPER: Fujitsu

A New Look at Energy-Efficient Servers
The family of PRIMERGY® Intel® Architecturebased servers offers a wide range of capacities, performance, and configurations to fit almost any application service requirements. Read now!

Three Top Open Source Bug Tracking Apps
Bugs in software are as difficult to avoid as death and taxes, which makes keeping track of known bugs an important task for quality-conscious developers. With many feature-rich open source bug-tracking programs available, choosing a suitable application can be a daunting task. The best bug tracking solution for your organization or project depends upon your specific needs and personal preference.... Read More

More than two decades after inventing the Web, Berners-Lee fights to keep it open
The Web will officially hit adulthood this coming Christmas, which will mark 21 years since computer scientist Tim Berners-Lee first initiated communications between an HTTP client and a Web server, thus marking the dawn of the so-called "information age" that defined the 1990s. The linking of hypertext with transmission control protocol is now so routine that we forget how revolutionary it really was at the time. Even Berners-Lee, in a question-and-answer session posted on the World Wide Web Consortium in 2008, seemed to downplay his own role in creating such a world-changing technology. Read More

Space scientist, MIT PhD, pleads guilty, gets 13 years in prison for espionage
A space scientist with a PhD in Planetary Sciences from the Massachusetts Institute of Technology who once worked for NASA, the Department of Energy, the Department of Defense, and the White House's National Space Council, pleaded guilty today to attempted espionage for offering classified satellite information to a person he believed to be an Israeli intelligence officer. Read More


WHITE PAPER: ADTRAN

Adopting Unified Communications: Key Steps to Consider
The faster your business can locate, gather and share information, the more productive and competitive you can be. That's why small and medium enterprises are upgrading to a unified communications (UC) system, which can improve customer service, streamline product development and speed response to new opportunities. Learn more. >>

Ten years after 9/11, cyberattacks pose national threat, committee says
Ten years after the terrorist attacks of Sept. 11, 2001, the nation faces a critical threat to its security from cyberattacks, a new report by a bipartisan think tank warns. Read More

DigiNotar certificates are pulled, but not on smartphones
Browser makers have generally been quick to react to the computer compromise at digital certificate issuer DigiNotar, but that hasn't been the case for all mobile phone makers. Read More

Start up offers Saas app to manage data-breach incidents
If your company suffered a data breach, would you know what to do to comply with state, federal and local law? Start-up Co3 Systems is offering a software-as-a-service (SaaS) application to tackle that unhappy task, tracking how a corporate data-loss incident is handled. Read More


WHITE PAPER: Quest Software

Accelerate Recovery Time After a Disaster
In this Quest Software white paper authored by the Data Management Institute, learn the key challenges in designing an effective disaster recovery plan. Then discover how a solution based on continuous data protection can rapidly restore your critical applications and get your business running again with virtually no downtime. Read Now!

IBM, 3M team to glue together high-powered silicon bricks for servers, smartphones
IBM and 3M today said they will jointly develop a new line of adhesives they hope will let them make it possible to build commercial microprocessors composed of layers of up to 100 separate chips. Read More

Norton Internet Security 2012
Norton Internet Security (NIS) 2012 adds new features to the suite's toolkit, including those to enhance PC performance and make some basic use of the cloud; it also adds some tweaks to the interface. This is not a major overhaul, but the addition of new tools makes a useful piece of protection software even more valuable. Read More

Wikileaks: Online infiltrators often take credit for terrorist attacks
Analysts at an Israeli company that infiltrates online forums to identify terrorists often claim responsibility for attacks to bolster their credibility, according to a recently-leaked cable from the U.S. Department of State. Read More

 
 
 

SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. What online news looked like on 9/11
  2. Apple takes Chinese food company to task over their logo
  3. Microsoft blacklists all DigiNotar certificates
  4. HP (again) shows us how not to do it
  5. ATM hack gives cash on demand
  6. Scammer "crams" $35 million in false phone charges -- from prison
  7. 10 scariest hacks from Black Hat and Defcon
  8. Comodo hacker claims credit for DigiNotar attack
  9. Rice demonstrates full-duplex wireless technology
  10. 10 ways to enhance Google+
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: