Найденные страницы с тегом topic всего 11912

P2P Payments: One Man’s Experience | Network World

Lately, I've been getting a flood of press calls and inquiries about P2P payments. I wrote about the general topic in a link available to our clients, but something nagged at me: I hadn't actually done a P2P payment myself. As luck would have it, on Thursday, April 8 I went out to lunch with some colleagues, and saw my chance. I paid the entire bill with my Amex card, and told my lunch companions I would send them a bill via PayPal. What follows is a chronology of my experience actually trying to do what m

A power plant hack that anybody could use | Network World

The night before the start of this week's Black Hat hacker conference here in Las Vegas, security researcher Dillon Beresford gave a demonstration to a small audience in his room at Caesar's Palace. The topic: how a hacker could take over the Siemens S7 computers that are used to control engines, machines and turbines in tens of thousands of industrial facilities.

Is iOS jailbreaking an enterprise security threat? | Network World

Apple’s recent decision to disable an iOS jailbreak detection API has renewed debate over the enterprise risks of letting unauthorized apps run on iOS devices. We talked to a mobile security consultant for some perspective on the polarizing topic.

Social networking changing face of collaboration | Network World

An infusion of social software is helping fuel an evolution of enterprise collaboration that will eventually give users more flexible and distributed tools for finding, organizing and sharing data, according to a conference of experts exploring the topic.

ISPs experimenting with new P2P controls | Network World

Peer-to-peer traffic management was a hot topic at this year's NXTComm convention in Las Vegas, as several telecom panelists and keynote speakers highlighted new methods for handling P2P traffic crunches.

Mommas don’t let their babies grow up to be engineers | Network World

The American Society for Quality commissioned Harris Interactive to conduct an online youth survey to learn about kids' interest level in engineering careers and parents input on the topic.

Fiber access gains on cable for broadband access | Network World

For the first time, fiber-based broadband access is expanding faster than cable: 4.2 million compared to 2.5 million subscribers were added during the first quarter, according to the analysts at Point Topic.

Why can’t I get promoted? | Network World

Today's topic is the question I most often received as an IT manager: "Why can't I get promoted?"

Trustguide’s final report | Network World

When we talk about identity transactions the word “trust” is frequently used, and used in different ways. It’s a topic that’s come up in this newsletter frequently (e.g., “What's the meaning of 'trust'?”). Go to the home page for this newsletter and enter “trust” in the search box and you’ll get a results list of over 60 separate issues. So you can imagine how I felt when I received notice that the final version of the TrustGuide report was ready.

WAN optimization tips | Network World

In the last newsletter we mentioned that Jim recently completed a six-city seminar tour for Network World on the topic of network and application optimization. We used that newsletter to discuss some of the key issues that were highlighted during the tour. We are going to continue that discussion in this newsletter.

Insight from the road | Network World

Jim recently completed a six-city seminar tour for Network World on the topic of network and application optimization. At each city, six of the industry’s leading vendors presented their views on the topic. In addition, during each seminar the audience engaged in a highly interactive question and answer session with the vendors. We will use the next few newsletters to highlight some of the key issues that were discussed during this tour.

Bad behavior online | Network World

I just sat in on a Web conference hosted by the National School Boards Association on the topic "Postings, Protection, and Policies: What School Leaders Need to Know About Online Teen Hangouts."

Naïve users who hog (or bring down) the network | Network World

Last time, we introduced our survey of 321 IT professionals on the topic of network misuse. We asked the respondents to identify the most unusual or outrageous network misuse that they had discovered on their network and we got quite a set of responses.

Network managers reveal extent of network misuse on their nets | Network World

In June 2005, we wrote about the importance of having visibility into the applications that are running over the WAN in part because having that visibility allows IT organizations to control network misuse and free up WAN bandwidth. At that time, we defined network misuse to be those instances in which a large percentage of the company’s network is being consumed by supporting traffic that is unauthorized and inappropriate. We are going to come back to the topic of network misuse in this and subsequent n

The seven laws of identity gets a Canadian makeover | Network World

Privacy is a hot topic these days. You can always tell the really hot topics because politicians want to get involved. Last week, the Information and Privacy Commissioner of Ontario, Ann Cavoukian staked a claim to being at the forefront of privacy issues on the Internet. She did this by becoming an evangelist for Microsoft’s InfoCard identity system.

Consumers, politicians and toolbars: full of bull | Network World

I am reading a fine book: On Bullsh*t, by Harry G. Frankfurt, professor of philosophy emeritus at Princeton University. Now you may think that BS is a risible topic, but, as Frankfurt points out, BS matters.

Where an IP PBX infrastructure works best | Network World

Picking up where we left off last time on the topic of trends and advantages of convergence and VoIP, today we'll highlight a recent discussion with Chris Lyman, CEO at Fonality. Fonality offers a premise-based IP PBX and has more than 1,000 IP-PBX systems deployed serving 15,000-plus business users.

Does the WAN have a role in integrating disparate apps? | Network World

Last time, we discussed our recent survey of 342 IT professionals in which they were asked to evaluate 22 IT related topics using two criteria - the importance of each topic to their organization and how much of a challenge it presented to their organization. In that issue, we discussed the security aspects and today, we will talk about one of the key application performance issues: the ability to unify, integrate, and/or enable the change of the disparate applications and activities that comprise a comple

Disaster recovery cited by IT pros as a significant challenge | Network World

We recently asked 342 IT professionals to evaluate 22 IT-related topics using two criteria - the importance of each topic to their organization and how much of a challenge it presented to their organization. In this week's WAN newsletters, we will identify which topics received the most votes and will discuss what this means for the WAN.

BMC aligns business service management with IT governance framework | Network World

Today, we’re still on the topic of compliance management, and I want to highlight two more companies in this space, although both do a whole lot more than “simply” manage compliance.

Security and virtualization | Network World

I sometimes find myself talking about a topic and getting blank stares. Then a year or two later, everyone is suddenly talking about it. One such topic is security virtualization. Until now, those two words were seldom seen together. You would have to live in a cave to have not heard about server virtualization, and storage virtualization also is discussed widely in storage areas. Network virtualization applies to virtual LANs (VLAN) and MPLS, so lots of people discuss that. But security was never brought

Certified vs. non-certified: The face-off | Network World

Our topic of certification vs. real-life work experience is being discussed in the print and online editions of Network World this week. David Foote, CEO of Foote Partners and Susan Underhill, vice president of HP Global Certification and Partner Education go head-to-head about whether certifications matter nowadays.

DRM, consumers and the God chip | Network World

The argument for using SVP is that video piracy costs the industry money. The alliance references the Motion Picture Association of America's claim of $61 billion of lost revenue in 2005. This is, of course, a hugely debatable number and presupposes that without piracy that revenue would actually be acquired, but that's a topic for another column.

Connecting audio | Network World

Before we launch into this week's main topic, we need to revisit an issue we covered a few weeks ago. In a recent column we discussed a way to get an OS X system to talk to a Windows 2003 Server acting as a domain controller by disabling the default security policy that is set to always encrypt network connections, which OS X doesn't support. The fact the OS X's SMB services don't support encryption is ridiculous, and it is remarkable that Apple hasn't addressed it yet.

Rising cyber-nationalism leads to amplified cyber-mistrust | Network World

Though once a rare topic, today the air is filled with accusations of state-sponsored cyber-espionage and break-ins as the governments of U.S., China, Russia, Israel, India and Iran, among others, can be heard calling foreign cyberattacks a threat. The effect is a powerfully accelerating cyber-nationalism that's driving buildup of cyber-commands and general rancor that may spill over into trade relations.