Most of us have a list of things that we’d like to do before we shuffle off this mortal coil. Some people’s lists include such things as base jumping naked off the Empire State Building or hiking across the Hindu Kush in the dead of winter in nothing more than Speedos and flip-flops.
There are a few key features that make the IETF as important as it has been over the years. One is its mode of operating mostly on mailing lists; another is its openness. Anyone can participate in the IETF standardization process by joining a mailing list; there is no fee or membership agreement. Join, read the documents, which are open to all on the Web, and start participating. You do not have to spend money attending the face-to-face-meetings in order to participate effectively in standards development.
Though technology becomes more pervasive in the lives of young people each day, technology jobs aren't high on the lists of what they want to do when they grow up. Consider the 90 percent of girls between the ages of 11 and 16 who think computers and cutting edge gadgets are cool, according to a recent survey of 1,000 U.K. adolescents: Only 28 percent of those girls are considering careers in the technology industry.
While Oracle says it will play well with most Linux platforms and server hardware, the company is singling out a few Linux software and server/storage hardware product combinations with a new level of software certification.
Pseudo-requirements are sliced and diced and assembled into lists of tasks that no one person could actually perform. It seems the real goal is to eliminate as many people as possible so recruiters don’t have to talk with all those pesky applicants, and then the company turns around and claims it can’t find anyone.
Network World's recently-released NW200 - which lists the top 200 vendors in the network industry, by revenue - was again fairly light on Linux companies this year. This is probably what you get for selling a product that can be downloaded for free; however, companies that use Linux as a major part of their business strategy did quite well.
As information security grows in importance and recognition, security practitioners can sometimes feel overwhelmed by the flood of information available through published journals, magazines, and the Web. For example, my favorite information security portal http://www.infosyssec.com is packed with resource links. The SecurityTraq section lists 60 white papers and magazines about the topic of management of security, networks and systems, most of which are free to professionals.
As information security grows in importance and recognition, security practitioners can sometimes feel overwhelmed by the flood of information available through published journals, magazines, and the Web. For example, my favorite information security portal http://www.infosyssec.com is packed with resource links. The SecurityTraq section lists 60 white papers and magazines about the topic of management of security, networks and systems, most of which are free to professionals.
As information security grows in importance and recognition, security practitioners can sometimes feel overwhelmed by the flood of information available through published journals, magazines, and the Web. For example, my favorite information security portal http://www.infosyssec.com is packed with resource links. The SecurityTraq section lists 60 white papers and magazines about the topic of management of security, networks and systems, most of which are free to professionals.
The kernel puts limits on which functions can be used
from a loadable module. But instead of an all-or-none
approach, one plan would create access control lists
of which modules are allowed to use which functions.
The Pacific Telecommunications Council (PTC) this week hosted the unveiling of Intelligent Community Forum's annual finalist list, which this time included several cities from the United States, which had been absent from the two previous lists. However, the conference chair said that national telecom policy is "pathetic" and warned that the United States is slipping behind other countries in broadband use, even as Internet video takes off.
A Web site commissioned by the U.S. Transportation Security Administration (TSA) to help travelers whose names were erroneously listed on airline watch lists originally had multiple security problems that could lead to identity theft, says a congressional report released Friday.
As someone pointed out to me last week, we're still spending an inordinate amount of time talking about authentication, and still trying to find a way to obviate the need for users to either memorize or write down lists of passwords and account names. Certainly that issue has come up in this newsletter a number of times over the past few weeks and months.
Macs vs. PCs vs. Linux arguments are dominating two mailing lists I'm on. The vitriol may be slightly less than in the past, but many of the same attitudes exist with subjective arguments trumping logic on both sides.
IPhone lovers and other smartphone users should take heed: A security researcher showed ways to spy on a BlackBerry user during a presentation Wednesday, including listening to phone conversations, stealing contact lists, reading text messages, taking and viewing photos and figuring out the handset's location via GPS.
Two items on BI (business intelligence) customers' wish lists have long been ease of use and a lower burden on IT. A startup called ThoughtSpot, which came out of stealth mode on Wednesday, says its new BI appliance can tackle both.
The U.S. federal government has $40 billion set aside for healthcare IT. Much of that is earmarked for electronic medical records, but experts say there are other pressing needs that would improve healthcare. Unified communications and telepresence are two of the technology solutions on many hospitals' wish lists.
ActionPacked Networks offers free network device management software to help IT more easily configure access control lists, track traffic flow data and set quality of service metrics without depending solely on command line interface to manage Cisco and other routers.
Network World recently threw down a challenge to Cisco and Avaya, saying these companies need to do a better job when it comes to securing VoIP networks. Now, in the interest of fairness, Cisco and Avaya get a chance to respond, and we print their responses here for you to judge. When looking at the responses, one thing is immediately clear: vendors love bullet lists. What is not clear are the details of how they plan to change things.
Cisco, Avaya respond to Tester's Challenge on VoIP security
http://www.
Many small items could serve as interesting gifts this holiday season. In U.S., mobile headsets could be on many wish lists as a growing number of U.S. states enforce laws requiring drivers talking on mobile phones to use hands-free kits. A mobile headset worth considering is Cardo Systems Inc.'s Scala 700, which includes a phone-swapping feature that lets users switch between two mobile devices. Chefs would enjoy Food Quality Sensor International Inc.'s SensorfreshQ, a gadget that detects bacteria levels
Change your passwords twice a year and never reuse them. Those are a few of the tips Google lists in an online security checklist that helps people stay one step ahead of the scammers.
A European Commission official due to take charge next month of the antitrust case against Microsoft has been offered a job by a Brussels-based consultancy that lists the software vendor among its clients, the Commission and Microsoft said Thursday.
Like the star on a Christmas tree, iPhone is perched atop all the top 10 gadget lists for 2007, and with good reason. Not only did iPhone revolutionize the way people think about their mobile phones -- as many writing those lists crow -- but in my case, it has changed the way I live.