Search This Blog

Thursday, July 23, 2009

Still hanging onto that Ethernet cable? Windows 7 RTM leaked to BitTorrent; Was Microsoft violating GPL?

Windows 7 RTM leaked to BitTorrent last week; Microsoft accused of being in violation of GPL on Hyper-V code
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Brocade
rule

Why a Firewall Sandwich?
Enterprise security through Web security, messaging security and gateway security is the only way to protect your network from intruders, identity theft, security compromises, legal liability, malware, hackers and viruses. Find out about advanced methods of firewall security that will create a "firewall sandwich" and ensure the highest level of protection.

rule

Spotlight Story
How much longer are you going to hang onto that Ethernet cable?

As more enterprises deploy wall-to-wall Wi-Fi, they're finding end users voting with their network interface cards: given a choice, they go with wireless rather than wired access. Read full story

Related News:

Windows 7 RTM leaked to BitTorrent last week
Although even the best-connected users can't get Windows 7's final code until Aug. 6, people willing to pirate the new operating system can download it now from several file-sharing sites, searches show.

Microsoft accused of being in violation of GPL on Hyper-V code
Microsoft was reportedly in violation of the GPL license on the Linux kernel Hyper-V code it released to the open source community this week. The drivers Microsoft created used both open-source and closed-source components which is a clear no-no under the GPL.

Microsoft's Linux madness has a method
Under the glare of Microsoft's historic Linux kernel code submission last week is the fact that the software giant on many levels still lives in a community of one much more so than a community at large.

RFID: Passport to Insecurity
While we're on the theme of governmental incompetence, I saw this piece on the fundamental insecurity of the passive RFID chips now being embedded in US (and a few other) passports.

iPhone can't make up for AT&T's declining wireline business
Despite its success in using the iPhone to attract customers, AT&T saw its net income take a significant drop in the first quarter of 2009.

Wi-Fi group's basic test won't change with final 11n
The Wi-Fi Alliance will not change the basic requirements of its IEEE 802.11n certification process when the current draft specification gives way to a formal standard later this year.

Desktop virtualization on a slow ramp, VMware chief says
Organizations are finding it hard to calculate the cost benefits of desktop virtualization and broad adoption is unlikely to happen for another year or two, VMware's CEO said on Wednesday.

F5 beats estimates
F5 Networks yesterday reported a quarterly profit that exceeded analyst expectations and shared a better-than-expected forecast for its ongoing fourth quarter.

Report: Michael Jackson's death certificate improperly accessed
At least six staff members at the Los Angeles County Coroner's Department improperly viewed Michael Jackson's death certificate hundreds of times in the two weeks immediately following the pop star's death on June 25, the Los Angeles Times reported.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Dell's SMART Approach to Workload Automation
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.
Learn More Today


 

July 23, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft stuns Linux world, submits source code for kernel
  2. Five technologies Iran is using to censor the Web
  3. Adobe admits users vulnerable after downloading Reader
  4. ZerO1's mobile offer may be too good to be true
  5. Why would Microsoft patent a 'butt hinge with butt straps?'
  6. Google Earth now takes you to the moon
  7. Avaya set to buy Nortel enterprise business for $475 million
  8. IBM strikes OEM deal to resell Juniper Ethernet switches, routers
  9. Juniper pounds spike into Cisco's heart
  10. IEEE 802.11n heads for a finish in September

Creating and Managing Value-Driven Product Portfolios
The product portfolio decisions you make today will determine whether your company is relevant tomorrow. With such a fine line between success and failure, now is the time to make product portfolio decisions based on fact—not guesswork, political agendas, intuition or the opinions of the loudest voice in the room.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: