Wednesday, June 15, 2011

Smartphones and tablets create huge corporate security challenge

Microsoft issues first patch for IE9 amidst 34 holes closed | Verizon's latest LTE expansion: 5 things you should know

Network World Daily News AM

Forward this to a Friend >>>


Smartphones and tablets create huge corporate security challenge
Adapting security and management for the new generation of mobile devices -- everything from the Apple iPhone and iPad to Google Android devices to name a few -- is turning out to be a huge corporate challenge. Read More


WHITE PAPER: Belden

Going Green With Physical Layer Components
IT companies are keeping a keen eye on data center energy efficiency, space savings and the movement to build sustainable LEED-certified, "green" facilities. However, "green" can be difficult to measure at the physical layer. This white paper discusses how physical layer components with innovative, "green" features can lower costs while increasing productivity and health.

WHITE PAPER: IBM

Distributed Virtualization Management from Big Iron
Many enterprises started virtualization efforts to reap the benefits of consolidating their distributed infrastructure. This consolidation, however, has not ended datacenter infrastructure heterogeneity since enterprises seem intent on acquiring different virtualization platforms as well as heterogeneous hardware platforms. Read Now

Microsoft issues first patch for IE9 amidst 34 holes closed
As expected, Patch Tuesday was a whopper. Microsoft released 16 security updates (nine critical and seven important) addressing 34 vulnerabilities, including the first patch for Internet Explorer 9 and a rare patch for Hyper-V. Read More

Verizon's latest LTE expansion: 5 things you should know
Now that Verizon has fired up its LTE network in the major U.S. cities, the carrier can now concentrate on the midsize metropolitan areas. Read More

10 IBM design gems
IBM's corporate design program spans architectural, graphic and industrial design. Read More

Adobe patches second Flash zero-day in 9 days
For the second time in nine days, Adobe on Tuesday patched a critical vulnerability in Flash Player that hackers were already exploiting. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

10 iPhone passcodes to pass on
Attention iPhone users: You're not fooling anyone if you're using 1234, 0000, 2580, 1111, 5555, 5683, 0852, 2222, 1212, 1998 as your smartphone passcode. Read More

Daily innovation smackdown: Marc Andreessen vs. Scott McNealy
On paper this seems like an easy win for Marc Andreessen, but Scott McNealy already pulled off the upset of Larry Ellison. So why not one more? Vote now! Read More

Comcast bringing Skype to bring HD video calling to your TV
Comcast has reached an agreement with Skype to bring its HD video calling capabilities right into your living room television. Read More

Democrats seek major H-1B, green card reform
Silicon Valley's U.S. Rep. Zoe Lofgren has proposed a sweeping reform of the H-1B visa and green card in a new bill released Tuesday. Read More


WHITE PAPER: BMC

Six Advantages of a Cloud-Based Help Desk
Small and midsize companies shouldn't have to use less efficient, limited-functionality service desk solutions. Today's cloud-based help desks pack the same punch as on-premise enterprise solutions, without a large up-front investment or long installation time. Read more to find out how to get started with a cloud-based help desk today. Read More Today!

Metasploit launches cash-for-exploits Bug Bounty program
If you've got a way to crack Google Chrome, the Metasploit team wants to pay you for it. Today Rapid 7 announced that it has a total of $5000 in cash to reward to contributors who send in exploits for its Top 5 or Top 25 vulnerability lists. The exploits have to be submitted, and accepted, as modules under its standard Metasploit Framework license. Read More

Obama: 'We don't have enough engineers'
President Barack Obama is making a push to train 10,000 new American engineers a year, primarily with the help of the private sector. Read More

Ethernet vendors racing to meet demand
Ethernet vendors will need to develop faster products more quickly to keep up with the demand being created by mobile and cloud computing, some participants at an industry group meeting said on Tuesday. Read More

'Hold on -- my WLAN is tweeting me'
Several network vendors have built network management applications for popular smartphones and tablets. Enterasys Networks is one such vendor, but it also went a step further recently when it announced Project Isaac, which integrates its NMS with your favorite social media interfaces. Read More

First, Fire the Executives: iGate Patni CEO on His Merger of Unequals
iGate Patni CEO Phaneesh Murthy addresses his controversial acquisition of a much larger IT outsourcing company, the debt the combined company has incurred and the way Patni executives were treated during and after the deal. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Chrome nearly replaced Firefox in Ubuntu Linux
  2. Ubuntu breaks from the Linux pack
  3. Apple surrenders to Nokia in patent fight, others may follow
  4. Must-have data center utilities: Picks by IT pros
  5. The funniest sites on the Web
  6. Five things we love and five things we hate about Ubuntu 11.04
  7. Google's fast Web protocol gains a little speed
  8. IPhone 5 rumor roundup for the week ending June 10
  9. What happens if you catch a hacker and must deal with the FBI?
  10. Survey finds many disappointed in virtualization, cloud computing

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: