I was flying out to Interop Monday morning when I heard two execs a row ahead of me talking about a big upcoming product announcement. They might as well have just chucked all their expensive corporate security technologies out the window.
I've singled out Linden Lab for criticism for its scheme to require users of Second Life to offer proof of age before accessing adult content. But Linden Lab is only following standard practice on the Internet, where operators of porn sites and the government agree to pretend that we can verify the ages of people who access adult content online by requiring them to submit electronic documents.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.