Daily News: AM
Network World Daily News: AM, 10/25/07 10 reasons IT managers fear ITIL Adopting the best practices laid out in ITIL requires IT managers commit to a multi-year project, bring executive management on board and wear their thickest skin to work every day as a majority of people will resist the efforts to overhaul how IT does its job. Verizon to shell out $1 million to ‘wrongfully’ disconnected customers Verizon has agreed to pay $1 million to settle an investigation of the company’s alleged deceptive marketing practices conducted by the New York Attorney General’s office. Apple now bigger than IBM Apple has become the most valuable computer maker in the world. Executive Guide:Virtualization Meets Reality Virtualization is being used to make the most out of everything from applications and servers to desktops and storage. But as companies expand their reliance on the technology, challenges mount. Read this guide authored by a host of Network World editors and review this timely topic. Click Here for More Information
| | Oracle and BEA: What happens next? Despite consistent pressure from acquisition-happy Oracle, leadership at BEA Systems leadership has so far resisted selling itself to the software giant. Oracle now says it is prepared to pull its $6.7 billion offer for BEA off the table. What happens next may be anyone’s guess. Sybase brings enterprise e-mail to iPhone Sybase has confirmed plans to offer full client support for the iPhone within its Information Anywhere Suite. San Diego fires hit Qualcomm’s presence at CTIA Qualcomm is a big player in the mobile industry and the CTIA Wireless I.T. & Entertainment 2007 is a key event for it to attend, but that means little during a week when fire is threatening the San Diego area where the company is based. Google and Microsoft slobbering over Facebook Like rival lovers, Google and Microsoft are intensely courting Facebook, as the social-networking upstart picks petals off a flower -- "she loves me, she loves me not" -- and tries to decide which of the two will be allowed to buy a minority stake in the company, according to press reports. TJX data breach affected 94 million cards, banks allege The TJX data breach affected more than 94 million credit and debit card accounts, more than twice the number acknowledged by the big retailer, a group of banks allege in a new court filing. Payment-card security standards for wireless and Web applications debated Payment-card security rules that keep customer credit and debit card information from falling into the wrong hands are becoming a contentious issue as debate over anticipated Payment Card Industry (PCI) standards and their impact heats up. Taxis flagged as big security risk for mobile phones, laptops and digital assistants The biggest security threat to companies with a mobile workforce isn’t wardriving hackers stealing 1s and 0s from the air or burrowing through the corporate firewall; it’s absent-minded employees. During a six-month period in 2006, the publication reported, London taxicab drivers turned in the following electronic items to their lost-and-found departments: 63,315 mobile phones; 5,838 PDAs; 4,972 notebook computers CASE STUDY Avis tries harder with SOA Avis Budget Group revs up with a services-oriented approach that enables agility and flexibility while saving the business big bucks and tons of time. VIDEO Wireless pictures are worth 1,001 words I-Mate's Momento digital picture frames can grab photos from USB drives, SD cards and through the Internet via a wireless network connection. Keith gives the digital picture frame a run-through. PODCAST Protecting your intellectual property Everyday, it seems, there's a new charge of one company stealing another's intellectual property or violating a patent. Most recently, Microsoft charged Red Hat with violating some of its intellectual property claims. Network World's Jason Meserve talks about the issue and what can be done to protect software assets with Mike Dager, CEO of Arxan, a maker of intellectual property protection tools. (10:16) BLOGS Buzzblog: One picture is worth 335,000 charred acres The latest NASA photo of the Southern California fires is nothing short of astounding. The sliver of good news, however, is that the “fire blogger” we’ve been in touch with has been able to return to his home. Today on Cisco Subnet Hackers gain access to private hotel network using Cisco VoIP - readers and the hackers argue why hotel's VLAN allowed this to happen. Network capacity management: Everyone should do it but only a few do. Read a free chapter from the book "Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design." Today on Layer 8, where the last thing we built was a birdhouse that didn't last the winter: If you build it, NASA will not only come, it’ll give you $2 million dollars for you troubles. The space agency said it will offer $2 million in prizes if competing teams can successfully build a lunar lander at the Northrop Grumman Lunar Lander Challenge at Holloman Air Force Base, in Alamogordo, N.M., Oct. 27 and 28. Today on Microsoft Subnet Microsoft wins coup over Google with a $240 million stake in Facebook; Rebates for SMBs running Small Business Server 2003 R2; John Obeto writes: Socialism trumps democracy in the EU. Cisco Subnet giveaways - last few days to enter to win Last few days to enter to win free Cisco training worth up to $3,995, courtesy of Global Knowledge. Plus enter to win a free copy of "Monitoring with Cisco Security MARS" by Gary Halleen and Greg Kellogg, published by Cisco Press. |
No comments:
Post a Comment