Date: | Wed, 09 Mar 2005 14:22:51 -0500 (EST) |
From: | "NWC Online" <NetworkComputing@update.networkcomputing.com>
| Subject: | Network Computing Online #2.95 -- On Location With Google |
-- Network Computing Online #2.95 --
Your Online IT Resource
http://www.networkcomputing.com/
Wednesday, March 9, 2005
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
Join InformationWeek for a FREE, on-demand TechWebCast on
Understanding & Optimizing IT Service Delivery. Gain
actionable insights on ways to create operational
objectives, achieve peak operational performance, and
strengthen IT / LOB alignment through operational metrics.
Register and view now:
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFst0EP
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
Here's what's cooking on NWC Online this week!
1) The Daily Blog
- Having Ridden This Rough-hewn Road...
- Crypto-Panic Time or Not?
- What Price SOX?
2) YackITyYack
- Top 11 Mini Fever
- CEO Minute: Tideway Systems
- Expert Series: Security
- IT Haiku Contest
3) Calling All Readers
- E-poll: Data Centers
- E-poll: Storage Systems
- TechQuiz: Web Services
- IT Exam: The ROI of Server Consolidation
- Survey: Business Intelligence and Microsoft Office: Market
Trends
and Integration Practices
4) Editors' Picks
- Centerfold: University's New WLAN Cuts Out Uninvited APs
- On Location With Google
- Content and CRM: Completing the Picture
- Eight More Bugs Found in Firefox and Mozilla
- Yahoo Opens Up to Web Services
- Featured White Paper: Seven Mistakes Enterprises Make in
Optimizing Web Application and Portal Performance
5) Download Mania
- IE HTTP Analyzer 1.3
- Spam Nullifier
6) Eye on Security
- Alertcon: Denial of Service Attack in Nokia's Bluetooth Devices
- Security Threat Watch: Vulnerability in Linux PaX; Remote
Overflows in Mozilla/Firefox
7) Coming Events
- Leveraging EII for Operational Business Intelligence and
Corporate Performance Management
- Getting Smart About Offshoring: How Visual Simulation Gets
It Right the First Time
- Mobilizing Enterprise Applications to Improve Business
Performance
- Building, Deploying and Securing Wireless LANs
8) Subscription Information
Look for the next Network Computing Online newsletter on Wednesday,
March 16, 2005!
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
1) The Daily Blog
a) Having Ridden This Rough-hewn Road...
Well, the storage security review is about done. As an overview of what
you can do to protect your sensitive information, we feel it will give
you all that you need and more.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFsn0EJ
b) Crypto-Panic Time or Not?
The recent release of a paper detailing the way a Shandong University
team found a significant flaw in the SHA-1 encryption algorithm has
caused major ripples in the crypto-analysis world, and it's time to ask
whether the ripples will turn into major waves for folks implementing
computer and network security. The answer depends on a couple of major
factors.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFso0EK
c) What Price SOX?
Finally, some numbers have been collected to show the costs associated
with Sarbanes-Oxley compliance projects. But in the final analysis, the
whole thing remains one big crapshoot.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFZF0EE
Read more entries from The Daily Blog.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0B5MU0Ev
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
2) YackITyYack
a) Top 11 Mini Fever
This week, we're looking for the "Top 11 reasons we love the new Mac
mini desktop." Make us chuckle, and we'll print your entry here and
online. Here are a couple ideas to get you started.
--Better loft and travel for Ultimate Frisbee.
--It's a computer, and it's a Bonsai display box.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0CEhF0EQ
b) CEO Minute: Tideway Systems
Tune in to hear Brad Shimmin talk with Richard Muirhead, Tideway
Systems' CEO and founder, about the roadblocks to IT transparency that
cross business, applications and infrastructure. Plus, if you own an
iPod, you can enjoy this CEO minute "on the go" with our
Podcasting-enabled broadcast.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DEcU0Eb
c) Expert Series: Security
Rest assured that vendors are going after your security budget
aggressively. You need to be prepared to make sound decisions, offer
advice and ask the tough questions about the value of various
technologies and how they work. We have compiled a set of timely
articles on key topics that will get you going in the right direction.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DEcV0Ec
d) IT Haiku Contest
Thanks to everyone who submitted such great poetic masterpieces this
past week. Here's the top entry, by Thaddeus Melvin Jacobs. Perhaps
it's
the poem's sonorous pathos or its inverted syllable count for lines two
and three that caught our attention.
No Antelope lope
No Buffalo roam
In cubicle farm my home
Submit your own Haiku.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DCsc0E4
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
3) Calling All Readers
a) E-poll: Data Centers
Because of a technical problem with our original data center survey,
many of your responses were not recorded. We apologize and are asking
you to again take our survey. Your opinions will help us shape our
coverage in the special issue we are devoting to data centers. Please
share your thoughts on the issues confronting your data center and how
they are affecting your organization. Help us understand your concerns
by taking our survey.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFZD0EC
b) E-poll: Storage Systems
Storage systems: Can't live with 'em, can't smash 'em with a
sledgehammer. OK, so maybe that's a bit extreme. But it's likely that
storage is gobbling an increasing portion of your IT budget with no
sign
of slowing down. For our second annual storage reader opinion poll,
we're looking to gauge your interest and opinions in information
lifecycle management, virtualization, iSCSI and other topics. Results
will be used to shape coverage in Network Computing and Storage
Pipeline
for the coming year. Help us understand your concerns by taking our
survey.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFZE0ED
c) TechQuiz: Web Services
There's still time to take our latest quiz to see if your organization
is up to the challenge of implementing Web services. If you can
outsmart
our editors, we'll throw your name into the hat for a free NWC
collectible pen/stylus.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0TNs0Er
d) IT Exam: The ROI of Server Consolidation
The premise is simple--collapse multiple under-utilized servers into a
bigger server (virtualization) and save a ton of money--right? Well,
maybe. Take our interactive exam to find out if your company is ready
for consolidation.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DCsd0E5
e) Survey: Business Intelligence and Microsoft Office:
Market Trends and Integration Practices
Along with our research partner, Ventana Research, we need your help.
Please take a few minutes to complete this brief survey that examines
the priorities, actions and needs of organizations faced with
integrating Microsoft Office and business intelligence systems into a
seamless information dissemination environment. Thank you for your
participation.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DDod0E2
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
4) Editors' Picks
a) Centerfold: University's New WLAN Cuts Out Uninvited APs
By Kelley Jackson Higgins
The University of Miami's IT team hopes a new WLAN will eliminate
channel interference and tighten security, thereby helping them gain
control of the multiplying rogue access points that have been wreaking
havoc.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFZC0EB
b) On Location With Google
The recent speculation that Google might launch a new VoIP service
shouldn't come as a surprise. We've been saying for a long time now
that
VoIP is just another application that rides over the data network. If
Google can deliver an e-mail service, why should a voice service be far
behind?
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFsp0EL
c) Content and CRM: Completing the Picture
Tap into Web sites, syndicated information, e-mail messages, bills and
statements to add dimension to your customer. The effort to integrate
and mine content pays off before--and after--the sale.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFhz0EK
d) Eight More Bugs Found in Firefox and Mozilla
Just a day after one security firm warned of a vulnerability in Firefox
and Mozilla, a rival disclosed that another eight threaten the
open-source browsers.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DEzE0Ei
e) Yahoo Opens Up To Web Services
It was bound to happen. Yahoo has joined the ranks of Google, eBay,
Amazon.com and, more recently, TIVO, in opening up its internal systems
resources via Web services APIs.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0CXfo0EO
f) Featured White Paper: Seven Mistakes Enterprises Make in Optimizing
Web Application and Portal Performance
This white paper pinpoints seven mistakes to avoid when solving
application and portal performance bottlenecks from the first mile to
the last mile. You'll learn about what two companies have done to
successfully address this pain. The paper also discusses best practices
for deploying "smart" solutions that accelerate page-pops, improve the
end-to-end user experience, optimize the overall performance of your
critical Web applications and deliver cost savings in hardware,
software
and system/network upgrades.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFsq0EM
See all new white papers, Webcasts, case studies and product
information
in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0CmRv0EW
For additional research, check out our online encyclopedia providing
Web-based definitions of IT terms.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0XQ0E4
You can find links to these and other breaking news stories organized
by
technology via our handy NetNews Service.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0CJp80EP
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
5) Download Mania: Select Files From IT Pro Downloads
a) IE HTTP Analyzer 1.3
IE HTTP Analyzer is a plug-in for IE that allows you to capture
HTTP/HTTPS traffic and show a wide range of HTTP-related information,
including header, content, cookies, query strings and post form values,
directly in the browser window.
Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DE8G0Ee
Size: 2,053k
Platform: Windows
Licensing: Shareware
b) Spam Nullifier
Eliminate junk e-mail, spam, viruses, Trojans and spyware with Spam
Nullifier. It works with POP3 and IMAP.
Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DE8A0EY
Size: 3,672k
Platform: Windows
Licensing: Freeware
Note: By using IT Pro Downloads you agree to these terms of use.
http://www.itprodownloads.com/terms.jhtml
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
6) Eye on Security
a) Alertcon: Denial of Service Attack in Nokia's Bluetooth Devices
Nokia's Bluetooth devices are vulnerable to a denial of service attack
caused by a flaw in the Symbian Series 60 Platform. By setting a
specially crafted nickname, a remote user could cause a victim's phone
to restart once the victim searches for available Bluetooth devices and
encounters the malicious nickname.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0Btri0Ev
b) Security Threat Watch: Vulnerability in Linux PaX; Remote Overflows
in Mozilla/Firefox
The notable vulnerabilities this week include a significant local
vulnerability in the Linux PaX security add-on and remote overflows in
Mozilla/Firefox that allow code execution. Users of these packages are
highly
encouraged to perform upgrades as soon as possible.
For more information.
PaX: local privilege elevation
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFsr0EN
Mozilla/Firefox: remote heap overflow
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFss0EO
For more security alerts and information, sign up for our free Security
Threat Watch newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0CCEc0EI
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
7) Coming Events
a) Leveraging EII for Operational Business Intelligence and Corporate
Performance Management
Tuesday, March 15, 2005
11:00 AM PST / 1:00 PM CT / 2:00 PM EST
Learn how EII can help companies address data integration challenges
related to business intelligence and corporate performance management.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DEcl0Ey
b) Getting Smart About Offshoring:
How Visual Simulation Gets It Right the First Time
--An InformationWeek Vendor Perspectives TechWebCast
Wednesday, March 23, 2005
9:00 AM PST / 12:00 PM EST
We'll discuss how to take advantage of emerging business models like
fixed bid contracts, the increasingly important role of the business
analyst and practical steps toward a successful outcome.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DEcm0Ez
c) Mobilizing Enterprise Applications to Improve Business Performance
--An InformationWeek Vendor Perspectives TechWebCast
Thursday, March 24, 2005
9:00-10:00 AM PST / 12:00-1:00 PM EST
Discover how 50 of the Fortune 100 enterprises are able to deliver
business-critical applications to their mobile professionals. Learn how
to securely deploy and manage information for your mobile professionals
where they need it most--at the point of business.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFZR0EQ
d) Building, Deploying and Securing Wireless LANs
--An Immersion Learning Program for Network Professionals and Engineers
Effective management and security of your wireless infrastructure is
essential to your business. When you enroll in this training program,
you will learn the best practices to ensure your wireless network is
accessible and available while maintaining your critical security
needs.
Join us for this exclusive hands-on, three-day course! For 2005 course
dates and locations.
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DAMt0Eg
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
Join InformationWeek for a FREE, on-demand TechWebCast on
Understanding & Optimizing IT Service Delivery. Gain
actionable insights on ways to create operational
objectives, achieve peak operational performance, and
strengthen IT / LOB alignment through operational metrics.
Register and view now:
http://update.networkcomputing.com/cgi-bin4/DM/y/emeW0GPvuP0G6u0DFst0EP
.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._
Put Us On Your White List
Don't let an over-eager e-mail filter bounce the Network Computing
Online newsletter! Our address:
NetworkComputing@update.networkcomputing.com
needs to be in your address book or on your anti-spam white list. Ask
your admin or ISP how to do this, or check your anti-spam utility
documentation.
As always, we welcome your feedback about our newsletter. Please feel
free to message us directly if you have any comments or questions
(mailto:nwconline@cmp.com).
Important subscription contacts:
CMP Media LLC
600 Community Drive
Manhasset, NY 11030
Change your e-mail address.
http://networkcomputingsubscriptions.com/customerservice/
Sign up for your own issue of this newsletter.
http://www.submag.com/sub/nc?wp=wpdly2
Subscribe to Network Computing newsletters.
http://www.submag.com/sub/nc?wp=wpdly2
Still not receiving your own FREE subscription to Network Computing
Magazine? http://networkcomputingsubscriptions.com/customerservice/
Note: This newsletter utilizes dynamic URLs. For more information,
please refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy
Copyright (c) 2005 Network Computing, a CMP Media LLC publication
http://www.nwc.com/