Monday, July 27, 2009

Ericsson wins auction for Nortel wireless biz; 10 cutting-edge spy gadgets; Microsoft to rush out emergency patch

10 cutting-edge spy gadgets; Microsoft to rush out emergency IE patch
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sun Microsystems
rule

Storage made simple, just when you need it most.
Storage made simple, just when you need it most. Learn how to utilize Sun Storage Systems at a fraction of the cost.

rule

Spotlight Story
Ericsson wins auction to buy Nortel wireless business

Sweden's LM Ericsson has won the bidding war over the wireless assets of Nortel Networks, agreeing to pay US$1.13 billion for the financially beleaguered Canadian company's CDMA business and LTE Access technology. Read full story

Related News:

10 cutting-edge spy gadgets
As the Erin Andrews peephole tape video showed, it's all too easy to invade someone's privacy, and here are 10 spy gadgets that spies use to capture voice and data.

Microsoft to rush out emergency IE patch
Microsoft is taking the unusual step of rushing out two emergency security patches ahead of its regularly scheduled updates on Aug. 11.

Network Solutions warns merchants after hack
Criminals may have stolen more than half a million credit card numbers from merchant servers hosted by Networks Solutions, the Internet hosting company warned Friday.

Apple's iPhone 3GS encryption cracked in under 2 minutes
The iPhone 3GS has a newly minted hardware encryption capability. That's the good news.

Linux exec: Personal computers will be free like phones
Look for personal computer users to soon get their hardware in the same way that they get their cell phones: for free as part of telecommunications service subscriptions, the executive director of the Linux Foundation said on Friday afternoon.

GM CIO and outsourcing pioneer Ralph Szygenda retiring
How big a deal was GM CIO Ralph Szygenda? I once took a meeting with a GM PR person who was on a national media tour just to promote Szygenda's IT vision, and the CIO himself wasn't even in tow.

Video: Nissan car monitors GPS for road dangers ahead
A new safety system in the car will automatically slow it down if its traveling too fast into an oncoming curve.

Security certificate warnings don't work, researchers say
Every Web surfer has seen them. Those "invalid certificate" warnings you sometimes get when you're trying to visit a secure Web site.

Networking in the (Storm) Clouds
Johna Till Johnson wrote a very good column this week on cloud computing and networking; something that's been on my mind lately as "Cloud Computing" gets more and more buzz not just in the industry, but also at my IT shop.

Cisco provides update on FCoE
Looks like all we have to do is mention that the market for FCoE is a 2010-11 phenomena to trigger an update from Cisco PR. This week's installment states that Cisco has shipped over 100,000 Nexus 5000 switch ports to 900 customers.

Cisco dissolves Scientific Atlanta Web site
Cisco announced this week that it is migrating the majority of content from Scientific-Atlanta's Web site to Cisco's Web site. Cisco acquired the maker of cable set top boxes in 2006 for $6.9 billion to enter into the digital home entertainment market.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More


 

July 27, 2009

TOP STORIES | MOST DUGG STORIES

  1. Tech tattoos: The good, the bad and the RU SRS?!
  2. Microsoft admits it can't stop Office file format hacks
  3. America's 10 most wanted botnets
  4. Hacker group L0pht makes a comeback, of sorts
  5. MIT electric car may rival gas models on performance
  6. How much longer are you going to hang onto that Ethernet cable?
  7. Apple takes legal heel off throat of wiki operator
  8. Microsoft's Linux madness has a method
  9. Microsoft stuns Linux world, submits source code for kernel
  10. Palm webOS gains enterprise features

Top 10 Tips for Protecting, Securing SMB Data
Statistics show the typical small business will experience a disruptive event lasting more than 24 hours once every three years. Achieve peace of mind and greater efficiency: Download this whitepaper today and quickly discover the Top 10 best practices for securing SMB business data and ensuring quick recovery.
Read More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment