Security: Risk and Reward: Outsourcing security: Worry about cost or focus?
Security work is a lot of fun. There’s always some new threat or technology just over the horizon, challenging our assumptions
and existing controls. Things are changing so fast that is it almost impossible for a single person to have a broad view of
security in all areas of IT. Even large companies rely on a handful of security specialists to create policies and design
security controls across all applications and networks. If your security staff is spread too thin, however, they end up spending
most of their time reacting to security problems rather than planning and securing emerging technologies and applications.
That’s one reason why managed security services are gaining acceptance.
Security: Risk and Reward archive
Dr. Internet: Looking for Windows troubleshooting tool
I'm looking for a Windows troubleshooting and monitoring tool that would act similar to a firewall at the process level to
provide alerts when Dynamic Link Libraries and executable programs are loaded and run. Can you recommend anything?
Dr. Internet archive
'Net Insider: Lessons from the BlackBerry outage
About a year ago Research in Motion, the folks who bring you the BlackBerry e-mail-on-the-go device, paid more than $612 million
to keep from being shut down by an injunction after being found guilty of patent infringement. A few months before the settlement,
the U.S. Justice Department had filed a legal brief in the case asking for a delay in any shutdown to give the government
time to develop a database of state and federal BlackBerry users (as many as 300,000 at the time) so that they could be exempted
from disruption.
'Net Insider archive
Editorials: OLPC laptop has the right stuff
Regardless of where you stand on Nicholas Negroponte's One Laptop Per Child effort, there is no denying the attraction of
the product this nonprofit has developed for distribution to needy children around the world.
Editorials archive
Op-ed: How to find your security holes
It is crucial today to prevent vulnerabilities across the enterprise and remove security holes in your desktops, laptops and
servers. Knowing what they are, where they are on your network, and how to remove them is more important than sniffing packets
and listening for burglars.
Op-ed archive
Gearhead: Gearhead extra: All at sea with Xcelsius
1. We found several online references to “Short Timers Clock” and it appears to be applied specifically to countdowns and
more commonly to countdowns to retirement. We found no etymology of the phrase.
Gearhead archive
Gearhead: All at sea with Xcelsius
You know how sometimes you pick up a product that is just amazing and you can't put it down? Soon the day has zipped past
followed by the night and then the next morning and you discover that there's not enough coffee on the planet to keep you
awake.
Gearhead archive
Backspin: The Physics of IT
Science is how we try to explain the universe and what the guys who do science (usually called “scientists” but you can call
them anything you like because most of them are pretty nerdy) really want is a TOE. No, not those things that stop your feet
from fraying; what they want is a Theory of Everything, a theory that allows them to start from first principles and deduce
(if I might quote Douglas Adams) the existence of rice pudding and income tax.
Backspin archive
Eye on the Carriers: Addressing the challenges in a virtual workplace
We’ve talked quite a bit recently about the inexorable shift toward the virtual workplace and reviewed the technical requirements
for supporting one. Now it’s time to look at the challenges.
Eye on the Carriers archive
'Net Buzz: 'Ideal digital kitchen' a recipe for overkill
The Internet Home Alliance will soon unveil its grand vision for "the ideal digital kitchen." Bet you didn't know you wanted
a "recipe projection system."
'Net Buzz archive
Nutter's Help Desk: Naming network devices
Some of the network gear is named simply 'router', 'switch', etc. You can also tell where a particular device is located just
by its IP address. Is there a recommended way to name the equipment?
Nutter's Help Desk archive
Cool Tools: iPod video projector
The built-in iPod dock is cool for showing off videos stored on iPods, whether they're music videos, TV shows, movies or video
podcasts (such as the Cool Tools Video Show) to a mass audience. The lightweight projector is also easy to carry around.
Cool Tools archive
Yankee Ingenuity
Branch Office Best Practices
'Net Insider
Editorials
Backspin
Eye on the Carriers
Above the Cloud
Reality Check
On Security
Bottom Line
User View
|
Security: Risk and Reward
Cyber Spaces
Telecom Catalyst
Industry Commentary
Gearhead
Strategy Session
'Net Buzz
Nutter's Help Desk
Cool Tools
Packet Evangelist
|
Dr. Internet
Intranet Advisor
Totally Unplugged
Venture over the Horizon
On the Road
Wired Windows
Cache Advance
Infrastructure Insights
Data Center Doctors
Tolly on Technology
|
In-House Counsel
Telework Beat
|
Small Business Tech
HomeLAN Adventures
|
Home Base
Digital Domicile
|
The Bleeding Edge
|
View from the Edge
|
The Bleeding Edge
|
Cute, thin and available |
What Network Worlders are talking about:
Test out the #1 Help Desk Software
Test out the new version of Numara Track-It! - the leading help desk solution featuring coverage for all of your critical
IT related issues. Get your free demo here.
Test out the #1 Help Desk Software
Test out the new version of Numara Track-It! - the leading help desk solution featuring coverage for all of your critical
IT related issues. Get your free demo here.
IT HelpDesk & Customer Support Software
Internal IT HelpDesk Software with Asset Mgmt. Customer Support Software with Account & Contact Mgmt
Understand Business VoIP Telephony - Free Guide
Get your free 80 page Business IP Telephony Guide now. Ideal solution for a 50+ VoIP system.