Search This Blog

Monday, August 31, 2009

12 cool ways to donate your PC's processing power; Developer denies software to beat Chinese censors is malicious

Developer denies software to beat Chinese censors is malicious; Lawmakers strike new tone with proposed bill giving Obama power to shut down Internet
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Citrix Systems
rule

A Roadmap to Reducing IT Complexity
A major study by IDG Research in June of 2009 found clear evidence that IT complexity has become public enemy #1 among information managers. Complexity stifles innovation, drives up costs, and retards agility. And the top choice among IT managers by far for reducing IT complexity is virtualization. The IDG eZine A Roadmap to Reducing IT Complexity and the many resources it contains will help guide you to a simpler yet far more powerful IT environment.

Download this eZine now!

rule

Spotlight Story
12 cool ways to donate your PC's spare processing power

So you'd like to do more volunteering but can't find the time? Here's an easy way to do it: Donate the spare processing power on your computer via one of the dozens of ongoing volunteer computing projects, many based on open source software called BOINC. You know, like SETI@home, the well-documented project that uses otherwise idle computing cycles to help "search for extraterrestrial intelligence." Here's a look at 12 cool projects. Read full story

Related News:

Developer denies software to beat Chinese censors is malicious
UltraSurf is free software designed to promote unrestricted Internet access for citizens of China.

Lawmakers strike new tone with proposed bill giving Obama power to shut down Internet
The second draft of a Senate cybersecurity bill appears to tone down language that would grant President Obama the power to shut down the Internet.

Skype Wiretapping Trojan Publicly Released
The Swiss creator of a Skype Trojan that can intercept calls made using the VoIP program has released the Trojan's source code online in an attempt to allow for its widespread detection.

Wi-Fi cell phones expected to double in two years
Global shipments of Wi-Fi-enabled cell phones are expected to double between 2009 and 2011, at least partially due to the emergence of a slew of smartphones with Wi-Fi capabilities, according to an analyst at ABI Research in New York.

Arista's New vEOS Providing Competition for the Cisco Nexus 1000V
I wrote a (incendiary?) blog a few weeks ago about using vendor competition in your network to save money. But, to make this work, you first need to have viable vendors to compete.

Solid-State Drives Go Mainstream
Just about everyone has heard the hype surrounding solid-state drives, but only now are we starting to see SSDs get a foothold as a storage alternative for everyday use. The market is flooded with options, and the performance we've seen from several of the latest drives in our tests back up some of the claims that SSD supporters have made about the technology's advantages.

Networking around the World
I had an Ah-Ha moment this week when I was overseas and I opened up my web browser to see the following Google page. I guess I should have expected this even though my browser probably has some setting that defines my preferred language as English.

Cisco NetFlow is a must have for managing virtual applications in the cloud
Last month readers may recall, I did the first Cisco NetFlow Q & A with Xangati founder and CTO Jagan Jagannathan and so for readers who will be attending next week's VMworld, the Q & A followup below might be of interest too.

Hard drive encryption on a server is nothing more than useless!
Hard drive encryption (data-at-rest encryption) on a server is less secure as it introduces more potential pitfalls.

The Importance of Reading RFC's
Recently I taught the Network+ class. It's one I teach rarely, and that's too bad because it's one of my favorites; molding new minds and all that. I was reminded of the basics of networking: TCP/IP and its standard behavior, the three-way handshake and all that jazz. How does one learn the inner workings of protocols? You learn them by reading RFC's.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Simplify Your Intrusion Prevention System Implementation Without Sacrificing Security.
Application security and network visibility across your entire network is a reality with an integrated Intrusion Prevention System. Register now for this Live Webcast scheduled for Thursday, September 17, 1:00 p.m. EST/10 a.m. PST. Industry experts will explain how you can easily integrate IPS into an existing network in a manageable, cost-effective way. Get the security threat response your organization requires without suffering from information overload.
Register now.


IDC ROI Calculator for IBM Tivoli Netcool
This ROI calculator from IDC will help you quickly and easily understand the average annual benefit that you may be able to achieve using IBM® Tivoli® Netcool®. The tool and underlying calculations and metrics are based on IDC research of 14 IBM Tivoli Netcool implementations.
Read Now

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 words you can never say in the office
  3. Robocalls outlawed as of Sept. 1
  4. 5 techs that could reinvent cell phones
  5. The opposite of Twitter
  6. High-tech blimps earning their wings
  7. Obsolete technology: 40 losers
  8. Worst co-workers ever
  9. Free tool brings analysis to Cisco ASA
  10. 2,200 broadband stimulus applications

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: