Those wacky requests from end usersEvery IT manager has a story to share about end users who get a wee bit confused when it comes to the technology they use. We talked to lots of those IT managers and collected some of the best stories. Read those, and add your own in our forum.12 tips for making the most of your IT budgetFew organizations have to pinch pennies more than nonprofits, so we asked Habitat for Humanity's Jim Thie and two other IT execs from well-known nonprofits to share their creative ideas for getting the most mileage from their IT budgets. Get the full story.Gates says security boils down to four focus areasBill Gates Tuesday opened the annual RSA Security Conference with an overview on the state of security that was long on vision and broad with its details. Click here for more.HP and Novell offer hardware\/software value packHP has been offering an all-inclusive Red Hat blade package since the summer and has decided to celebrate Valentine\u2019s Day by sharing the love with Novell\u2019s SuSE Linux customers. Click here for more.Scott Bradner: An iPod as a legislative forceScott Bradner writes: \u201cSen. Ted Stevens' experience with his new iPod clearly sensitized him to the user end of this discussion on the broadcast flag, and that may make a real difference in the outcome. That is good news for consumers and maybe not so good news for the RIAA.\u201d Click here for more.Q&A: Why network execs need to care about application securityIn the run-up to Network World\u2019s first IT Roadmap conference, which will take place March 20 in Boston, Linda Leung is quizzing the analyst-keynoters of three of the tracks. First up is Nemertes Research analyst Andreas Antonopoulos, who heads up the application and content security track. Click here for more.For news updated throughout the day, go to Network World's NetFlash news page.