Thursday, October 25, 2007

10 reasons IT managers fear ITIL; Verizon to shell out $1M to customers; Apple now bigger than IBM

Network World

Daily News: AM




Network World Daily News: AM, 10/25/07

10 reasons IT managers fear ITIL
Adopting the best practices laid out in ITIL requires IT managers commit to a multi-year project, bring executive management on board and wear their thickest skin to work every day as a majority of people will resist the efforts to overhaul how IT does its job.

Verizon to shell out $1 million to ‘wrongfully’ disconnected customers
Verizon has agreed to pay $1 million to settle an investigation of the company’s alleged deceptive marketing practices conducted by the New York Attorney General’s office.

Apple now bigger than IBM
Apple has become the most valuable computer maker in the world.

Executive Guide:Virtualization Meets Reality

Virtualization is being used to make the most out of everything from applications and servers to desktops and storage. But as companies expand their reliance on the technology, challenges mount. Read this guide authored by a host of Network World editors and review this timely topic.

Click Here for More Information

Oracle and BEA: What happens next?
Despite consistent pressure from acquisition-happy Oracle, leadership at BEA Systems leadership has so far resisted selling itself to the software giant. Oracle now says it is prepared to pull its $6.7 billion offer for BEA off the table. What happens next may be anyone’s guess.

Sybase brings enterprise e-mail to iPhone
Sybase has confirmed plans to offer full client support for the iPhone within its Information Anywhere Suite.

San Diego fires hit Qualcomm’s presence at CTIA
Qualcomm is a big player in the mobile industry and the CTIA Wireless I.T. & Entertainment 2007 is a key event for it to attend, but that means little during a week when fire is threatening the San Diego area where the company is based.

Google and Microsoft slobbering over Facebook
Like rival lovers, Google and Microsoft are intensely courting Facebook, as the social-networking upstart picks petals off a flower -- "she loves me, she loves me not" -- and tries to decide which of the two will be allowed to buy a minority stake in the company, according to press reports.

TJX data breach affected 94 million cards, banks allege
The TJX data breach affected more than 94 million credit and debit card accounts, more than twice the number acknowledged by the big retailer, a group of banks allege in a new court filing.

Payment-card security standards for wireless and Web applications debated
Payment-card security rules that keep customer credit and debit card information from falling into the wrong hands are becoming a contentious issue as debate over anticipated Payment Card Industry (PCI) standards and their impact heats up.

Taxis flagged as big security risk for mobile phones, laptops and digital assistants
The biggest security threat to companies with a mobile workforce isn’t wardriving hackers stealing 1s and 0s from the air or burrowing through the corporate firewall; it’s absent-minded employees. During a six-month period in 2006, the publication reported, London taxicab drivers turned in the following electronic items to their lost-and-found departments:
63,315 mobile phones; 5,838 PDAs; 4,972 notebook computers

CASE STUDY

Avis tries harder with SOA
Avis Budget Group revs up with a services-oriented approach that enables agility and flexibility while saving the business big bucks and tons of time.

VIDEO

Wireless pictures are worth 1,001 words
I-Mate's Momento digital picture frames can grab photos from USB drives, SD cards and through the Internet via a wireless network connection. Keith gives the digital picture frame a run-through.

PODCAST

Protecting your intellectual property
Everyday, it seems, there's a new charge of one company stealing another's intellectual property or violating a patent. Most recently, Microsoft charged Red Hat with violating some of its intellectual property claims. Network World's Jason Meserve talks about the issue and what can be done to protect software assets with Mike Dager, CEO of Arxan, a maker of intellectual property protection tools. (10:16)

BLOGS

Buzzblog: One picture is worth 335,000 charred acres
The latest NASA photo of the Southern California fires is nothing short of astounding. The sliver of good news, however, is that the “fire blogger” we’ve been in touch with has been able to return to his home.

Today on Cisco Subnet
Hackers gain access to private hotel network using Cisco VoIP - readers and the hackers argue why hotel's VLAN allowed this to happen. Network capacity management: Everyone should do it but only a few do. Read a free chapter from the book "Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design."

Today on Layer 8, where the last thing we built was a birdhouse that didn't last the winter:
If you build it, NASA will not only come, it’ll give you $2 million dollars for you troubles. The space agency said it will offer $2 million in prizes if competing teams can successfully build a lunar lander at the Northrop Grumman Lunar Lander Challenge at Holloman Air Force Base, in Alamogordo, N.M., Oct. 27 and 28.

Today on Microsoft Subnet
Microsoft wins coup over Google with a $240 million stake in Facebook; Rebates for SMBs running Small Business Server 2003 R2; John Obeto writes: Socialism trumps democracy in the EU.

Cisco Subnet giveaways - last few days to enter to win
Last few days to enter to win free Cisco training worth up to $3,995, courtesy of Global Knowledge. Plus enter to win a free copy of "Monitoring with Cisco Security MARS" by Gary Halleen and Greg Kellogg, published by Cisco Press.

MOST-READ STORIES:
1. Storm worm strikes back at security pros
2. Top 20 Firefox extensions
3. Unlimited gall to cost Verizon $1 million
4. 'Fire blogging' tech expert on the frontlines
5. Cisco's $330M buy into WiMAX
6. Ballmer disses Google on wireless plans
7. Why swearing at work is a good thing
8. ID thieves have 50% chance of going to prison
9. Wireless video transfers 100X faster than WiFi
10. Gartner's top 10 strategic technologies for 2008

MOST-DOWNLOADED PODCAST:
Twisted Pair: Rumor Mill — Who's Buying Who?


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment