[kml_flashembed movie="http://www.youtube.com/v/z0pTBNkt9g4" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://www.youtube.com/v/mTbpuQzMnxA" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://www.youtube.com/v/RJISYEbPF4E" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://www.youtube.com/v/szLmAPW39uE" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://www.youtube.com/v/rDwWXpju77Q" width="425" height="350" wmode="transparent" /]
In case you weren’t one of the readers stampeding these stories, here’s are the most popular tales from across TechTarget’s five Australian sites in 2008:
1. SearchCIO readers could not get enough of this story comparing virtualisation wares from Microsoft and VMWare.
2. Career advice clearly appeals to networking professionals, who stampeded this piece about how certifications can improve your prospects at work.
3. Old-school is still big for security pros, who loved this piece about five command line tools to detect Windows hacks.
4. The blend of open source NAS and virtualisation proved the most popular mix for our storage-oriented readers.
5. Bluetooth for Business was the story of most interest to SearchVoIP ANZ readers in 2008.
|By 2020, the virtual world will have blended with the physical world; to speak of them as separate spheres will seem anachronistic.
Nicholas Carr, as quoted in Pew: 55% of Experts Herald Virtual Worlds and Augmented Reality in 2020
Here’s a link to the newest Pew Internet Life report.
|Companies often use lifecycle management as a last ditch effort, a “Hail Mary” pass…In reality, product lifecycle management is a difficult task. The root of its difficulty lies in its proactive nature.|
Companies naturally take reactive stances to their products as they move through their lifecycles, responding to ebbs and flows in profits, reacting to competition, worrying about the inevitable patent expiration. Product lifecycle management must be a proactive initiative. It must be a key organizational aspect of the company and not a burden, a positive force for profit and for the future of the business. And that’s a difficult transition.
|A Baltimore federal court judge ordered six absent defendants yesterday – including one from Maryland – to shut down Internet businesses that the Federal Trade Commission claims are part of a vast $100 million “scareware” scheme that tricked more than a million people into purchasing useless security software by making them think their computers were under attack.
Tricia Bishop, Court orders ‘scareware’ shut down
The companies allegedly represented themselves falsely as Internet marketers and used legitimate advertising outlets to place malicious advertisements that redirected consumers to the defendants’ Web sites.
There, screens would pop up saying a security scan had revealed harmful or illegal files and urging computer users to purchase software for $40 to fix the phony problems. In that way, the companies were able to bilk people of more than $100 million, according to the FTC.
Bit9’s come out with their list of 2008’s Popular Applications with Critical Vulnerabilities. Top of the list? Mozilla Firefox. Is IE even on the list? Nope.
This caught my attention because I’m just about to FedEx back my old hard drive so it can be wiped clean and reformatted. You see, I was hit by the Backdoor.Tidserv Trojan and it shut me down in about ten minutes.
As soon as my Symantec warning came up, I shut down and rebooted in safe mode. The tricky little Trojan told me (usuing its Symantec voice) that I had successfully cleaned up, but it was lying. When I started back up, I was in pop-up city. Another shut-down and scan told my computer that a Trojan was found and quarantined. Again, it was lying. What the Trojan was doing was shutting me down a little bit more each time I ran a virus scan. After about five scans, I was toast.
My 2009 resolution? Remove Firefox.