READERS' CHOICEThe top 10 most-read STORIES this week1. Wacky requests from end usersHow do the feds tap phone lines?The new network switchSecurity titans ready for showdown at RSACisco launches security mgmt. platformThe IT profession in the year 2010Review: LANDesk wins desktop management testTata faces employee lawsuit in the U.S.How to make the most of your IT budgetGates says security boils down to four focus areas2. 3. 4. 5. 6. 7. 8. 9. 10. The top 5 most-read COLUMNS this week1. Nolle: Is Apple creating the FCC's worst fear?Nutter's Help Desk: Getting a handle on mystery bandwidth useFace-off: Is 'security in the cloud' the way to go?Gearhead: NetScanTools Pro: A networking Swiss Army knifeCool Tools: Ice cream machine highlights cool stuff at DEMO '062. 3. 4. 5. The top 5 most-read BLOG ENTRIES this week1. Vortex: Comcast, what part of 'competition' don't you understand?Security: RSA Conference, laugh riotOutsourcing: The changing face of outsourcingLayer 8: An easy way to get GmailLANs & Routers: As Cisco goes, so go the switch, router markets2. 3. 4. 5. This week's most popular FORUMS1. Strange user requestsIs 'security in the cloud' the way to go?LAN technology flopsCutting off the teen's late-night 'Net useDSL woes2. 3. 4. 5. The top 5 most-read WHITE PAPERS this week1. Lucent: EMA Special Report: Best Practices for Performance Management in Wireless NetworksConsentry Networks: Increasing LAN Security through User-based Visibility and Control3Com: Wireless LANs: Assuring Enterprise Security and Identity AwarenessHP: Identity Driven Management Technical BriefIDC Business Intelligence2. 3. 4. 5.