TITLE

BLOGOSPHERE

PUB. DATE
May 2008
SOURCE
Network World;5/5/2008, Vol. 25 Issue 18, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article features the views of readers and technology experts regarding various issues and topics published on the web in the U.S. According to Brad Reese, Cisco Subnet blogger, Cisco loses $2 million order to Nortel because it shows clients that Nortel equipment is more green. Researchers at Kent State University studies the language of instant messaging because it qualifies their own langauge and is not just bad grammar or bunch of mistakes. Noah Schiffman said that hackers of the world will unite defense readiness condition (DEFCON) 16 conference.
ACCESSION #
31925437

 

Related Articles

  • BLOGO SPHERE.  // Network World;11/16/2009, Vol. 26 Issue 33, p8 

    The article offers news briefs related to the blogging industry. Brad Reese, blogger of "Network World" mentioned that Mike Volpi had kept his word to Skype investment group after he made Jonathan Rosenberg transfer from Cisco Systems Inc. to Skype Ltd. Yoni Heisler, blogger of "Network World"...

  • WEB WEEK.  // Lawyer;4/21/2008, Vol. 22 Issue 16, p2 

    The article presents several blogs on the web concerning the legal activity in Great Britain. The legal blog "The Laws of Love," written by family barrister Mark Chaloner is a family law blog dealing with all aspects of relationships. The blog "Lo-Fi Librarian which was considered as one of the...

  • hacker tracker.  // CRN;8/14/2006, Issue 1207, p51 

    The article reports developments related to computer hackers in the U.S. Cisco has issued a fix on the exposure that could give an attacker the ability to execute arbitrary commands on security monitoring. The hacker may gain access to classified information which can cause damage to the...

  • Users warned of new flaw in Cisco IOS. Savvas, Antony // Computer Weekly;9/13/2005, p4 

    The article reports that a vulnerability in Cisco Systems Inc.'s Internetwork Operating System (IOS) could be exploited by remote attackers to crash or run malicious code on devices that run the software. IOS runs on Cisco's routers and switches, which make up a large portion of the Internet's...

  • Untitled. Saran, Cliff // Computer Weekly;9/1/2009, p13 

    The article reports that businesses using Cisco Systems Inc.'s Over-the-Air-Provisioning (OTAP) may be at risk of a hacking attack which targets access points to gain control of a corporate networks. The potential exploit, dubbed SkyJack by wireless security firm AirMagnet, creates a situation...

  • BLOGO SPHERE.  // Network World;5/12/2008, Vol. 25 Issue 19, p8 

    The article presents several blogs related to telecommunication. Cisco Subnet blogger Brad Reese comments on Cisco Systems Inc.'s latest earning report. Brian Egler discusses in his Structured Query Language (SQL) Server Strategies blog the innovation in storing log files by using the Redundant...

  • Untitled. Savvas, Antony // Computer Weekly;12/4/2007, p25 

    The article reports that Cisco Systems Inc. is trying to tackle a security threat in its voice over IP phones that allows hackers to eavesdrop on conversations. Cisco has confirmed that an attacker, with valid Extension Mobility authentication credentials, could cause a Cisco Unified IP Phone...

  • Thanks to blogs, the learned craft of journalism is being hacked away. Murray, Iain // Marketing Week;4/17/2008, Vol. 31 Issue 16, p66 

    The author reflects on the capacity of rank amateurs to share opinions, comments and analysis through blogs. He stated that amateur blogs are getting established journalists a little hot under the collar, however, professional publications are responding in some very odd ways. He added that...

  • BEST OF THE BLOGS. Henry, Steve // Campaign;1/22/2010, Issue 3, p23 

    Several blogs are discussed including one from a reader on creative management, another one about reality television (TV) programs.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics