Найденные страницы с тегом substance material всего 17690

EU releases text of secretive ACTA copyright treaty | Network World

The final version of the international Anti-counterfeiting Trade Agreement (ACTA) leaves the door open for countries to introduce the so-called three-strikes rule, which would see Internet users cut off if they download copyrighted material.

Engineers create fingernail-sized chip that holds 1TB of data | Network World

North Carolina State University engineers have created a material that can hold 1TB of data on a chip the size of a fingernail. The technology represents a 90% reduction in size compared to today's silicon-based chips.

Quest extends Unix Sudo tool | Network World

Reflecting the growing need for automation tools in the enterprise, Quest Software has released a software package that could help Unix administrators better manage policy files that determine which users can access privileged material and programs on Unix and Linux systems.

Group: New version of PROTECT IP may target legal sites | Network World

An upcoming version of U.S. legislation designed to combat copyright infringement on the Web may include provisions that hold online services such as Twitter, Facebook and YouTube legally responsible for infringing material posted by users, according to one group opposed to the bill.

Q&A: Resumes that stand out from the crowd shine in both style and substance | Network World

Author David Noble thinks nothing on your resume is too small to merit your close attention.

Many IT pros find inappropriate material on employee laptops | Network World

Nearly three-quarters of corporate security and IT professionals in the U.S. have found "inappropriate" pictures, videos or browser cache links on employee laptops, a survey released Wednesday shows.

Porn producer sentenced to prison for online distribution | Network World

A producer of pornographic video known as Max Hardcore has been sentenced to 46 months in prison after a conviction on multiple obscenity offenses, including charges he transported obscene material over the Internet.

Preparing for the CISSP exam, Part 1 | Network World

A former student recently wrote to me with a request for suggestions on what to read in preparing for the CISSP exam. I decided to answer him by writing an essay that readers of this column who are thinking about the exam could also use. By the end of the essay, I had so much material I was forced to chop it up into smaller pieces to fit the constraints of this column, so here's part 1 of 4.

Plagiarism outside the classroom | Network World

Most readers know from personal experience in school that plagiarism - the use of someone else’s words or ideas without attribution or without indicating that an exact copy the material is being quoted - is a definitely a Bad Thing.

EDPACS archive a treasure trove | Network World

My friend and colleague Dan Swanson (CIA, CMA, CISA, CISSP, CAP) runs a Yahoo group relating to IT and information assurance (IA) audit that readers may find useful. One can receive his postings either by receiving individual e-mail messages, by choosing daily digests, or by logging on to the group Web site to see the messages online. He posts a wealth of material of interest to auditors and IA specialists - especially educators.

Personal expression vs. corporate policy | Network World

What would you do if you saw sensitive or offensive material about your organization on the Web? Perhaps you would contact your corporate counsel and discuss methods for applying pressure to have the material removed; if necessary, your organization might even initiate legal proceedings for a tort under the laws of libel, protection of trade secrets, violation of copyright or misuse of trademarks.

ProCurve Networking site has useful white papers | Network World

White papers vary in quality; sometimes a vendor-written white paper can be commercial puffery devoid of substance, irritating to read, and counterproductive both for reader and sender. However, having written commercial white papers myself, I am often impressed with the work and care devoted to the subject matter in good white papers.

Nesting dolls of archived data | Network World

How to preserve content in a useful fashion is a problem that intrigues many in library and academic IT. If you are storing a copy of some presentation to the Board related to the decision to, say, open a medical school, how do you preserve that material for posterity?

Don’t use WEP, say German security researchers | Network World

The Wi-Fi security protocol WEP should not be relied on to protect sensitive material, according to three German security researchers who have discovered a faster way to crack it. They plan to demonstrate their findings at a security conference in Hamburg this weekend.

MS-ISAC offers Webcasts for all | Network World

The Multi-State Information Sharing and Analysis Center (MS-ISAC) provides information from the 50 United States and the District of Columbia on a site hosted by the State of New York. There’s a great deal of material on the site that's useful for everyone interested in raising security awareness in the corporate world or in academia.

Tabbed interface framework masters CDs, DVDs with HTML | Network World

We need to build a tabbed interface framework for mastering CDs and DVDs containing HTML content. The content does not require server interaction but may contain video and/or animated presentation material. We have Java skills and a legacy Macromedia Director application we want to replace for delivering PC and Mac content on disk. What would you recommend?

Italian judge blocks access to Swedish file-sharing site | Network World

A judge in the northern town of Bergamo, Italy, has ordered Italian ISPs to block access to the Swedish file-sharing Web site The Pirate Bay in a crackdown on the illegal sharing of copyright material over the Internet.

EU to set guidelines on video game sales to children | Network World

The video gaming industry must do more to protect minors from unsuitable material and cooperate better with national authorities in the European Union, the European Commission said Tuesday, after conducting a survey of measures taken at national level designed to shield children from violent, explicit and frightening video games.

College uses NAC to avoid P2P subpoenas | Network World

A college reports that NAC is delivering a new type of cost avoidance that is helping to pay for its NAC deployment. By discovering and controlling peer-to-peer file sharing of music and video with its NAC gear, the school has also cut back on the number of subpoenas it gets from music industry groups upset about pirating copyright material. At a cost of $1,200 each just to respond, that is a savings that can add up.

Getting CERIAS about security | Network World

Today I want to point to one of the outstanding sites for material that can serve as the basis for your next brown-bag lunch: the vast collection of research and educational lectures, documents and links available from the Center for Education and Research in Information Assurance and Security at Purdue University.

Synthesia launches LLM-powered assistant to turn any text file or link into AI video | VentureBeat

All a user has to do is provide the source of the material — be it a website, text file, word document, PDF or idea — and choose a template.

Heat it, bend it, slam it and the latest gadget glass won’t break | Network World

Pity the glass on the front of your smartphone. It typically gets subjected to a lot of abuse through its life and sometimes even shatters if the forces are too much. But glass manufacturers are continually pushing the boundaries of what's possible with the material, and some of the latest gadget glass is on show this week by Nippon Electric Glass at the Ceatec 2013 expo.

The future of network optimization | Network World

It's a challenge deciding what to write about each week in this newsletter - but not because it's hard to find material. Quite the opposite. Every time I turn around there's a new product launch, or a partnership, or a start-up with a new optimization angle. There's so much activity in the network optimization arena, choosing just a couple of items each week is tough.

More NetWare to Linux educational material | Network World

Last week's newsletter pointing to Novell's "Bridging NetWare skills to Novell OES for Linux" training prompted reader Mike Ossing to drop me a note with his impressions of the course. Ossing had gone through it last fall when it was first announced. His impression was that Novell "...barely scratched the surface, and if I hadn't had the chance to previously play with the Novell [Linux] desktop and the SuSE 9.2 install, with my 'Dummies' book close at hand, I'd have been a little lost. Maybe a lot lost. I

Bill would give special designation to ISPs that block porn | Network World

A bill introduced this month in the Utah House of Representatives would give ISPs that block access to pornographic material a special designation and an official seal that they could display on their Web sites and use in their promotional materials.

Похожие теги: