Tuesday, April 14, 2009

Report: Microsoft, Yahoo talking again; 1 in 5 Windows PCs still hackable by Conficker

Twitter wrestles with fourth worm attack; Cloud computing is a scary proposition
Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by AMD
rule

The Green Advantage
Most companies get into green IT for the lower electricity bills. But many organizations are finding that green IT initiatives can also be a meaningful source of real competitive advantage. Find out about four ways green IT is giving businesses an edge in today's tough marketplace.

rule

Spotlight Story
Report: Microsoft, Yahoo talking again

John Fontana By John Fontana
Microsoft and Yahoo have begun talking again and this time the focus is on search and advertising deals and not acquisition, according to a report in The Wall Street Journal. Read full story

Related News:

1 in 5 Windows PCs still hackable by Conficker
Although the media blitz about the Conficker worm prompted a significant number of enterprise users to finally fix a six-month-old Windows bug, about 1 in 5 business computers still lack the patch, a security company said Monday.

Twitter wrestles with fourth worm attack
Another worm attack early Monday on Twitter kept the micro-blogging Web service chasing down infected accounts and deleting rogue tweets.

Cloud computing is a scary proposition
Mathias: I'm probably the biggest proponent of Web services/cloud computing/whatever on the planet, because such - in theory, anyway - is the ideal platform for mobile computing going forward. And yet, I'm troubled: there are enough holes in this concept at present to give even rabid supporters pause.

Botlab keeping an eye on spamming botnets
University of Washington researchers have developed a prototype system called Botlab that monitors botnets to gain insight into a major generator of spam.

EMC’s new Symmetrix array targets virtual data centers
EMC is unveiling a new Symmetrix storage array designed to support heavily virtualized data centers with hundreds of petabytes of storage and mass quantities of virtual servers.

Taking a stab at open source IP Telephony
Izhar: It’s been some time now that I was curious about open source IPTEL. Known in many names but all comes back to the Asterisk mother ship. Since it’s an open source application, it can save the potential customer some money.

Palm Pre Could Launch by May 17
Stand back! The Palm Pre - a.k.a. the latest iPhone killer - may launch by May 17, according to several hot rumors.

Microsoft targets IE6, IE7 users with browser upgrade
Microsoft Corp. will begin pushing Internet Explorer 8 (IE8) to users running the older IE6 and IE7 browsers this week, the company has announced.

PCI security rules may require reinforcements
The PCI standard, long touted as one of the private sector's strongest attempts to regulate itself on IT security, is increasingly being slammed by critics who claim that the rules aren't doing enough to protect credit and debit card data.

Cisco phone takes a ride on Air Force One
Cisco Subnet blogger Brad Reese says the company's PR department got an inadvertent boost from The New York Times, which published two photos of a Cisco phone onboard Air Force One.

Microsoft promises to reduce prices for cloud WS2008 licenses
Microsoft will be bowing to pressure from Amazon and offering a simpler, cheaper Windows cloud hosting licensing deal to Amazon and others, promises Bob Muglia.

New Microsoft commercial takes another jab at Apple
Microsoft's third commercial in its "Laptop Hunter" series invariably finds these "laptop hunters" taking time out of their shopping experience to stick it to Apple, or more specifically, to Mac users themselves.

Buzzblog: Snopes.com gets an "A" from fellow fact checkers
FactCheck.org gives Snopes.com a dose of its own medicine and the Internet's best-known BS-detector comes through the exam the picture of good health. As for the charge - widely circulated in a chain e-mail - that Snopes lied about an Obama opponent? That one's DOA.

Podcast: Prepping for Tougher Health Data Rules As part of the recent stimulus bill, the HITECH Act will create standard electronic health records for every American by 2014, as well as introduce strict new rules for the protection of these health records. John Linkous from eIQnetworks discusses the components of the act and how IT can start preparing now for the new standards. (10:12)

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by AMD
rule

The Green Advantage
Most companies get into green IT for the lower electricity bills. But many organizations are finding that green IT initiatives can also be a meaningful source of real competitive advantage. Find out about four ways green IT is giving businesses an edge in today's tough marketplace.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/14/09

Today's most-read stories:

  1. Conficker awakens, starts scamming
  2. Microsoft eating up U.S. and global netbook markets
  3. Bill would give Obama power to shut down Internet
  4. Are you an IT geezer? (and we mean that in a good way)
  5. A Twitter virus shows up: StalkDaily
  6. The 10 worst Microsoft product names of all time
  7. Netbook computers spark corporate interest
  8. Conficker, the Internet's No.1 threat, gets an update
  9. The implications of Skype's free software application for iPhone
  10. Fear and loathing in Windows 7: Testing Branch Cache using Linux
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free at http://www.nww.com/rpgx.jsp?c=XU1PHBZ4303.

IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: