NETWORK WORLD NEWSLETTER: JEFF CARUSO ON THE VOICES OF NETWORKING 11/29/04 Today's focus: The killer app has arrived
Dear [EMAIL PROTECTED], In this issue: * The killer app has arrived * Letterman would be proud * Microsoft's new strategy: implied threats * Address Internet security now * Links related to Voices of Networking * Featured reader resource _______________________________________________________________ This newsletter is sponsored By BMC Software Linking IT Priorities to Business Objectives, an IDC whitepaper. Get insights from IDC on aligning business goals and IT priorities. IDC offers practical, actionable information on how Business Service Management can help you reduce operating costs, improve service levels, respond faster to business needs and protect delivery of business-critical. Click here to download this whitepaper now. http://www.fattail.com/redir/redirect.asp?CID=88777 _______________________________________________________________ Hold what the future holds Right there, in your hands, 70 of the world's most promising new technologies. Investment or deployment - you get the first shot. This is why executives, analysts, VCs and journalists come back time and again. To see. To touch. To harvest. Register Today http://www.fattail.com/redir/redirect.asp?CID=89243 _______________________________________________________________ Today's focus: The killer app has arrived By Jeff Caruso The killer app has arrived Howard Anderson has found the one new cell phone application that matters to him. It's not a camera. It's not a video game. It's technology that came out of the military, technology that could change the way we view cell phones - and it's headed for Verizon. <http://www.nwfusion.com/columnists/2004/112904anderson.html?net> Letterman would be proud Keith Shaw learned plenty of lessons after testing this year's batch of cool tools and gadgets for Network World's Gift Guide. Here he lists the top 10. <http://www.nwfusion.com/columnists/2004/112204cooltools.html?net Microsoft's new strategy: implied threats Microsoft's marketing has shifted from touting the benefits of Microsoft software to slamming the competition - that is, Linux - for possible patent infringement. While not saying Microsoft would sue users, the company is implying that someone would, says Scott Bradner. And that's just sad. <http://www.nwfusion.com/columnists/2004/112904bradner.html?net> Address Internet security now There are lots of threats out there on the Big Bad Internet. Hackers will launch a distributed denial-of-service attack on your company and then demand payment to stop it. Peer-to-peer networking will suck up your bandwidth and potentially leave your company open to copyright infringement lawsuits. To counter the threats, Johna Till Johnson this week names four ways you can protect yourself. <http://www.nwfusion.com/columnists/2004/112904johnson.html?net> _______________________________________________________________ To contact: Jeff Caruso Jeff Caruso is managing editor of online news for Network World. He oversees daily online news posting and newsletter editing, and writes the NetFlash daily news summary, the High-Speed LANs newsletter and the Voices of Networking newsletter. Contact him at <mailto:[EMAIL PROTECTED]> _______________________________________________________________ This newsletter is sponsored By BMC Software Linking IT Priorities to Business Objectives, an IDC whitepaper. Get insights from IDC on aligning business goals and IT priorities. IDC offers practical, actionable information on how Business Service Management can help you reduce operating costs, improve service levels, respond faster to business needs and protect delivery of business-critical. Click here to download this whitepaper now. http://www.fattail.com/redir/redirect.asp?CID=88777 _______________________________________________________________ ARCHIVE LINKS Columnist archives http://www.nwfusion.com/columnists/ _______________________________________________________________ Out with the old, in with the New - Application Front Ends (AFEs) Tune in to learn about an evolutionary jump from the late '90s - load server balancers - to today's state-of-the technology - AFE. http://www.fattail.com/redir/redirect.asp?CID=89244 _______________________________________________________________ FEATURED READER RESOURCE DOWNLOAD INDUSTRY WHITE PAPERS NOW NW Fusion's White Paper Library is your source for the latest industry white papers. Recent additions to the library include white papers on securing remote access, VOIP and productivity, domain name system best practices, WLAN security, IT documentation and much more. Click here to download: <http://www.nwfusion.com/vendorview/whitepapers.html> _______________________________________________________________ May We Send You a Free Print Subscription? You've got the technology snapshot of your choice delivered at your fingertips each day. Now, extend your knowledge by receiving 51 FREE issues to our print publication. Apply today at http://www.subscribenw.com/nl2 International subscribers click here: http://nww1.com/go/circ_promo.html _______________________________________________________________ SUBSCRIPTION SERVICES To subscribe or unsubscribe to any Network World e-mail newsletters, go to: <http://www.nwwsubscribe.com/Changes.aspx> To unsubscribe from promotional e-mail go to: <http://www.nwwsubscribe.com/Preferences.aspx> To change your e-mail address, go to: <http://www.nwwsubscribe.com/ChangeMail.aspx> Subscription questions? Contact Customer Service by replying to this message. This message was sent to: [EMAIL PROTECTED] Please use this address when modifying your subscription. _______________________________________________________________ Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: <mailto:[EMAIL PROTECTED]> Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 For advertising information, write Kevin Normandeau, V.P. of Online Development, at: <mailto:[EMAIL PROTECTED]> Copyright Network World, Inc., 2004 ------------------------ This message was sent to: [EMAIL PROTECTED]
