Найденные страницы с тегом lists всего 15213

Wccftech's Most Anticipated Strategy and Simulation Games of 2024

Lists, lists everywhere. These are our most anticipated Strategy and Simulation games of the coming year. Let's have a look and find out.

IT: red in tooth and claw | Network World

Most of us have a list of things that we’d like to do before we shuffle off this mortal coil. Some people’s lists include such things as base jumping naked off the Empire State Building or hiking across the Hindu Kush in the dead of winter in nothing more than Speedos and flip-flops.

IETF: Not a teenager anymore | Network World

There are a few key features that make the IETF as important as it has been over the years. One is its mode of operating mostly on mailing lists; another is its openness. Anyone can participate in the IETF standardization process by joining a mailing list; there is no fee or membership agreement. Join, read the documents, which are open to all on the Web, and start participating. You do not have to spend money attending the face-to-face-meetings in order to participate effectively in standards development.

Study: Girls find few female role models in IT field | Network World

Though technology becomes more pervasive in the lives of young people each day, technology jobs aren't high on the lists of what they want to do when they grow up. Consider the 90 percent of girls between the ages of 11 and 16 who think computers and cutting edge gadgets are cool, according to a recent survey of 1,000 U.K. adolescents: Only 28 percent of those girls are considering careers in the technology industry.

Oracle lists its favorite platforms for running on Linux | Network World

While Oracle says it will play well with most Linux platforms and server hardware, the company is singling out a few Linux software and server/storage hardware product combinations with a new level of software certification.

Please see me in person | Network World

Pseudo-requirements are sliced and diced and assembled into lists of tasks that no one person could actually perform. It seems the real goal is to eliminate as many people as possible so recruiters don’t have to talk with all those pesky applicants, and then the company turns around and claims it can’t find anyone.

Wal-Mart to send automated shopping lists to its mobile app | Network World

Wal-Mart plans to use big data about a customer's usual shopping to automatically create shopping lists for them on its mobile app.

Linux vendors make noise in the NW200 list | Network World

Network World's recently-released NW200 - which lists the top 200 vendors in the network industry, by revenue - was again fairly light on Linux companies this year. This is probably what you get for selling a product that can be downloaded for free; however, companies that use Linux as a major part of their business strategy did quite well.

Security periodicals written by experts | Network World

As information security grows in importance and recognition, security practitioners can sometimes feel overwhelmed by the flood of information available through published journals, magazines, and the Web. For example, my favorite information security portal http://www.infosyssec.com is packed with resource links. The SecurityTraq section lists 60 white papers and magazines about the topic of management of security, networks and systems, most of which are free to professionals.

Security periodicals written by experts | Network World

As information security grows in importance and recognition, security practitioners can sometimes feel overwhelmed by the flood of information available through published journals, magazines, and the Web. For example, my favorite information security portal http://www.infosyssec.com is packed with resource links. The SecurityTraq section lists 60 white papers and magazines about the topic of management of security, networks and systems, most of which are free to professionals.

Security periodicals written by experts | Network World

As information security grows in importance and recognition, security practitioners can sometimes feel overwhelmed by the flood of information available through published journals, magazines, and the Web. For example, my favorite information security portal http://www.infosyssec.com is packed with resource links. The SecurityTraq section lists 60 white papers and magazines about the topic of management of security, networks and systems, most of which are free to professionals.

Kernel space: Tightening symbol exports | Network World

The kernel puts limits on which functions can be used from a loadable module. But instead of an all-or-none approach, one plan would create access control lists of which modules are allowed to use which functions.

U.S. cities make ‘intelligent’ list in 2008, but national policy still ‘pathetic’ | Network World

The Pacific Telecommunications Council (PTC) this week hosted the unveiling of Intelligent Community Forum's annual finalist list, which this time included several cities from the United States, which had been absent from the two previous lists. However, the conference chair said that national telecom policy is "pathetic" and warned that the United States is slipping behind other countries in broadband use, even as Internet video takes off.

Congressional report rips U.S. TSA Web site security | Network World

A Web site commissioned by the U.S. Transportation Security Administration (TSA) to help travelers whose names were erroneously listed on airline watch lists originally had multiple security problems that could lead to identity theft, says a congressional report released Friday.

Validation, authorization: The next steps to identity management | Network World

As someone pointed out to me last week, we're still spending an inordinate amount of time talking about authentication, and still trying to find a way to obviate the need for users to either memorize or write down lists of passwords and account names. Certainly that issue has come up in this newsletter a number of times over the past few weeks and months.

Why Is the PC vs. Mac war still raging? | Network World

Macs vs. PCs vs. Linux arguments are dominating two mailing lists I'm on. The vitriol may be slightly less than in the past, but many of the same attitudes exist with subjective arguments trumping logic on both sides.

Careless downloading makes BlackBerry users spy targets | Network World

IPhone lovers and other smartphone users should take heed: A security researcher showed ways to spy on a BlackBerry user during a presentation Wednesday, including listening to phone conversations, stealing contact lists, reading text messages, taking and viewing photos and figuring out the handset's location via GPS.

ThoughtSpot promises Google-like BI experience | Network World

Two items on BI (business intelligence) customers' wish lists have long been ease of use and a lower burden on IT. A startup called ThoughtSpot, which came out of stealth mode on Wednesday, says its new BI appliance can tackle both.

Healthy ways to spend $40 billion | Network World

The U.S. federal government has $40 billion set aside for healthcare IT. Much of that is earmarked for electronic medical records, but experts say there are other pressing needs that would improve healthcare. Unified communications and telepresence are two of the technology solutions on many hospitals' wish lists.

Network newcomer offers free Cisco router management software | Network World

ActionPacked Networks offers free network device management software to help IT more easily configure access control lists, track traffic flow data and set quality of service metrics without depending solely on command line interface to manage Cisco and other routers.

NetFlash: Cisco, Avaya respond to Tester’s Challenge | Network World

Network World recently threw down a challenge to Cisco and Avaya, saying these companies need to do a better job when it comes to securing VoIP networks. Now, in the interest of fairness, Cisco and Avaya get a chance to respond, and we print their responses here for you to judge. When looking at the responses, one thing is immediately clear: vendors love bullet lists. What is not clear are the details of how they plan to change things. Cisco, Avaya respond to Tester's Challenge on VoIP security http://www.

DIGITAL GEAR – A swappable mobile headset | Network World

Many small items could serve as interesting gifts this holiday season. In U.S., mobile headsets could be on many wish lists as a growing number of U.S. states enforce laws requiring drivers talking on mobile phones to use hands-free kits. A mobile headset worth considering is Cardo Systems Inc.'s Scala 700, which includes a phone-swapping feature that lets users switch between two mobile devices. Chefs would enjoy Food Quality Sensor International Inc.'s SensorfreshQ, a gadget that detects bacteria levels

Google: Change your password twice a year to keep safe | Network World

Change your passwords twice a year and never reuse them. Those are a few of the tips Google lists in an online security checklist that helps people stay one step ahead of the scammers.

Euro official on Microsoft case asks to change teams | Network World

A European Commission official due to take charge next month of the antitrust case against Microsoft has been offered a job by a Brussels-based consultancy that lists the software vendor among its clients, the Commission and Microsoft said Thursday.

WORLDBEAT – iPhone and me: A love story | Network World

Like the star on a Christmas tree, iPhone is perched atop all the top 10 gadget lists for 2007, and with good reason. Not only did iPhone revolutionize the way people think about their mobile phones -- as many writing those lists crow -- but in my case, it has changed the way I live.