- The truth about the IPv6 transitionPosted by George Ou in Real World IT on Nov 13, 2006 1:02 PM Subscribe via RSS or Email97 comments
- An IPv6 migration will involve upgrading all applications, hosts, routers, and DNS infrastructure. Anyone who moves to IPv6 will have to bear the burden of backward compatibility and the...[Read the rest]
More Coverage of IPv6
- Will Vista SP1 be a bridge to Longhorn Server?
- Word on the street is Microsoft's grand plan calls for Windows Vista Service Pack (SP) 1 to hit right about the same time as Longhorn Server. [Read the rest]
- Posted by Mary Jo Foley in All About Microsoft on: Nov 8, 2006 3:08 PM
- Robert Cringely shows blatant ignorance of networking
- Normally I dont get too worked up when someone makes a complete fool out of himself on networking issues but when a well known pundit like Robert Cringely of PBS... [Read the rest]
- Posted by George Ou in Real World IT on: Nov 6, 2006 1:49 AM
58 Comments - DNS fear mongering and Windows Vista
- Will Windows Vista actually cause a DNS traffic spike or is this just fear mongering? The reality is that any operating system running in a mixed IPv4 and IPv6... [Read the rest]
- Posted by George Ou in Real World IT on: Sep 6, 2006 4:21 PM
27 Comments - Rough switch to IPv6
- GAO: Agencies are behind in developing policies, making plans and maintaining and monitoring networks [Read the rest]
- Posted by ZDNet in ZDNet Government on: Aug 1, 2006 3:24 PM
- Google's secret IPv6 plans
- Google Operating System reports on Alex Lightmans theory why Google is buying up "dark fiber" -- to pursue IPv6 initiatives. According to Lightman, Google has a huge block of... [Read the rest]
- Posted by Garett Rogers in Googling Google on: Jun 24, 2006 1:21 PM


Top Rated
- For security, you can't beat Mac OS X +36 rating
- Report: Open-source e-mail systems biggest threat to Microsoft Exchange +34 rating
- Microsoft researchers follow Web spam money trail +20 rating
- You've heard of KDE (the K Desktop Environment)? How about an MDE (hint: M=Mozilla) +20 rating
- Firefox update patches FTP port scanning flaw +20 rating
- NSA issues Mac security guide +19 rating
- Apple TV = hacked +19 rating
- Securing OS X 10.4: Tips from Apple and the NSA +17 rating
- Russian (Gozi) Trojan powering massive ID-theft ring +15 rating
- Xbox Live hacked, accounts stolen +14 rating
blogs from our sponsors
subscribe
Use the feeds below to subscribe using your RSS feed aggregator.
Latest News

Premier Vendor Content Whitepapers, webcasts & resources from our Power Center Sponsors
- Hot Deals from Sun
-
Try out new products risk free through Sun's new 'Try and Buy Program;' save 25% on Sun Secure Global Desktop Software; trade up your UltraSPARC II servers; save on Sun StorageTek systems, and more!
- Find the right deal for you >>>
- Take advantage of VoWLAN today with ProCurve
-
Learn how the ProCurve Networking Adaptive EDGE Architecture enables organizations to take advantage of VoWLAN today as well as be ready for VoWLAN advances as they become available.
- Download the White Paper>>
- SOA Best Practices: The BPEL Cookbook
-
In this Oracle cookbook, 10 SOA practitioners share their real-world SOA best practices and provide practical viewpoints to tackle many of the common problems SOA promises to solve.
- Get the SOA cookbook now>>
- SQL Server 2005 Enterprise Capabilities
-
SQL Server manages the world's largest databases. Read about customers who are running Microsoft SQL Server 2005 Enterprise Edition, and learn more about what makes this technology world class.
- Learn more about SQL Server 2005>>
- Unlimited Online Meetings - Free for 14 Days
-
See how easy online meetings can be. Instantly launch WebEx MeetMeNow from your desktop, Outlook, or Instant Messenger service. Secure and reliable. Share your desktop, annotate, chat and more. The features you need, from the company you trust.
- Start your free trial now>>
ZDNet Government
- 'Vote Different' vid may turn out to hurt Obama
- Judge: Child Online Protection Act unconstitutional
- Feds, online trading firms meet to fight fraud
- 'Vote Different' maker steps forward, loses job
- MD bill pushes for paper trail but provides no funds
- Visit ZDNet Government
ZDNet Education
- Gates to finally get his Harvard degree
- A few good computers
- Cellphone marketing targeted at teens and 20s
- Michigan offers online Mandarin lessons to every student
- Deleting Online Predators bill revived
- Visit ZDNet Education


Quick Poll
Which of the following best describes why you don't use a headset at work?
In Focus
- Vista
- Digital Politics
- Google YouTube
- Microsoft Novell
- News to know
- Local Advertising
- Web 2.0
- Intellectual Property
- SAP
- Oracle
- VON 2007
- software+patents microsoft+novell
- DRM
- Apple TV
- Apple Security
- polls
- Software Patents
- MySpace
- Yahoo
- Microsoft code names
- Google Office
- iPhone
- Hands on Vista
- Vista tips
- Dell
- Windows to Linux Chronicles
- WGA
- Daylight Saving Time
- Zune
- Gmail
- Black Hat
- Second Life
- ODF
- Adobe Engage
- Windows to Mac Chronicles
- salesforce.com
- Apple-Cisco
- Virtual PC 2007
- Vista-Mac Showdown
- Vista Galleries
- Sun GPLs Java
- RSA 2007
- Windows Mobile 6
- Microsoft codenames
- Demo 2007
- Vista compatibility
- CES
- Sun
- IT Retardants
- browsers
- Macworld
- The Year Ahead
- IT that mattered in 2006
- Microsoft+Novell
- HP
- GPL
- Web Office
- Amazon EC2
- scary tech
- TechNet
- IPv6
- Oracle Linux
- Google JotSpot
- Demo Fall
- Net Neutrality
IT Facts
- Worldwide storage software market in Q4 2006
- 3 bln consumer electronics units to ship in 2010
- Top US beverage sellers: Pepsi, Coca-Cola, Cadbury
- 2006 media shares by ad spending
- US home systems installations to top $10 bln in 2007
- Clean energu to generate $226.5 bln by 2016
- Remote sensing products generated $7 bln in 2006
- 79% of employees participated in an office pool
- Ad spending by media in 2006
- Top Web advertisers in February 2007: Experian, NexTag and NetFlix
- Visit the IT Facts blog
ZDNet Blogs
- All About Microsoft
- Berlind's Testbed
- Between the Lines
- BriefingsDirect
- ChipLand
- Dev Connection
- Digital ID World
- Digital Markets
- E-Communications & Community
- Ed Bott's Microsoft Report
- Emerging Tech
- Enterprise Anti-matter
- Enterprise Web 2.0
- Googling Google
- Hardware 2.0
- IP Telephony
- IT Facts
- IT Services Insider
- John Carroll
- Lawgarithms
- Managing L'unix
- Office Evolution
- Open Source
- Over the Horizon
- Rational Rants
- Real World IT
- Service Oriented
- Software as Services
- Storage Bits
- The Apple Core
- The BlackBerry Beat
- The Great Seduction
- The Mobile Gadgeteer
- The Social Web
- The Universal Desktop
- Threat Chaos
- Tom Foremski: IMHO
- Web 2.0 Explorer
- Zero Day
- Endpoint Protection
-
-
Security Dashboard
CNET News.com and partners bring together some of the best tools available to gauge the threats roaming online.
View now -
Eight Daily steps to a more secure network
Learn more at TechRepublic - From our sponsors
-
Network Access Control: Combining Endpoint Protection with Endpoint Compliance
This TechRepublic Webcast explains why network access control (NAC) is a proven strategy for protecting your enterprise from the ever-more-sophisticated attacks.
Learn more about NAC - Whitepaper: The Essential Elements of Comprehensive Endpoint Security Download now
-
