Sunday, July 31, 2011

Mlmworld, you have more friends on Facebook than you think

facebook
Mlmworld, you have more friends on Facebook than you think.
Finding your friends on Facebook has never been easier. Once you've imported your contacts you can view, manage or delete them at any time.
Find Friends Now
Go to Facebook
Didn't sign up for Facebook? Please let us know.The message was sent to networkingworld@gmail.com. If you don't want to receive these emails from Facebook in the future or have your email address used for friend suggestions, you can unsubscribe. Facebook, Inc. P.O. Box 10005, Palo Alto, CA 94303

Friday, July 29, 2011

iPhone 5 rumor roll-up for the week ending July 29

Facebook to pay hackers for bugs | Debt reduction deadlock drags down corporate capital spending on software, more

Network World Daily News PM

Forward this to a Friend >>>


iPhone 5 rumor roll-up for the week ending July 29
Evidence, or "evidence," surfaces this week showing the Next iPhone will be either a lot like the existing iPhone or radically different. Apple moves into weapons manufacturing. Read More


WHITE PAPER: HP

Network Consulting Services Lead Enterprise Transformation
The IP network has become business critical for organizations that increasingly rely on it for all forms of communication and business processes. As a result of these demands, services organizations will play an increasingly important role in helping enterprises develop network strategies to optimize and successfully deploy networking investments. Learn more

WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Facebook to pay hackers for bugs
Facebook is going to pay hackers to find problems with its website -- just so long as they report them to Facebook's security team first. Read More

Debt reduction deadlock drags down corporate capital spending on software, more
The U.S. debt reduction deadlock in Congress is already taking a toll on how much companies are spending on property, buildings and equipment, including computer hardware and software, according to a new survey by ChangeWave Research. Read More

SysAdmin wanted to star in a Hollywood film
Happy SysAdmin Day. In honor of that, business video provider Qumu is inviting real life system administrators to enter a contest in which the winner will star in a short film, as part of series of short films. Qumu commissioned "Gears of War" video art director and filmmaker Jerry O'Flaherty to create a science-fiction short film with the SysAdmin as the hero. The first one is out now and is... Read More

Google gets defensive, buys IBM patents
Google acquired 1,030 patents from IBM in a defensive move aimed at protecting itself from lawsuits. "Bad software patent litigation is a wasteful war that no one will win," Google says. Read More


WHITE PAPER: IBM

Delivering Information you can trust
This whitepaper rovides an overview of the current data quality problem and describes how IBM® InfoSphere® Information Server for IBM System z® can become your foundation for data quality and make a big difference in helping you derive more value from the complex, heterogeneous information spread across your systems. Read Now

Data center startup Plexxi lands $20 million more
Stealthy data center startup Plexxi has landed another $20 million in funding as it continues development of a network fabric to tie together applications, compute and storage. Read More

Apple has more cash than US government! Buyout not imminent though
Given the current level of disarray and ineptitude of the elected officials in Washington DC right now this news probably shouldn't be all that shocking: Apple with its $76 billion in the bank has more cash than the US with its almost $74 billion. The news has prompted a variety of reactions. More wacky news: 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!) Read More

A10 countersues Brocade over patents
A10 Networks said it is countersuing Brocade for patent infringement and seeking to bar sales of its competitor's products in response to a motion filed this week by Brocade to bar sales of A10 products. Read More

Latest Windows Phone 7 tools let coders ready Mango apps
Microsoft has released the latest beta version of the Windows Phone 7 Mango development tools and OS build to developers. They can now start final preparations for submitting the first batch of Mango apps for certification in August. Carriers and handset makers are already testing near-final code for new phones due this fall. Read More


WHITE PAPER: Akamai Technologies, Inc.

A Perspective from the Edge of the Cloud
Akamai Chief Scientist and co-Founder Tom Leighton explores the major forces and technology layers driving the cloud computing movement, the types of architectural approaches emerging and an assessment of the challenges that must be overcome for cloud computing to broadly succeed. Read now

Anonymous claims to have breached ManTech International's network
A tweet sent by the hacker group Anonymous at midnight yesterday claims the group has broken into the network of defense contractor ManTech International and intends to release seized documents within 24 hours. Read More

Malwarebytes preps enterprise edition of PC-cleaning software
Malwarebytes this fall expects to release an enterprise-grade anti-malware platform that it says doesn't compete directly with traditional antivirus software because it relies more on observing how the malware acts and less on seeking code signatures. Read More

CA Technologies buys Watchmouse for cloud monitoring
CA Technologies is purchasing WatchMouse, a maker of SaaS-based tools for monitoring mobile and on-demand applications, the company announced Friday. Terms were not disclosed. Read More

How to survive Black Hat and Defcon without getting hacked -- maybe
Among the thousands of security experts at the Black Hat, Defcon and Security BSides conferences next week in Las Vegas, some will surely test whether they can break into nearby laptops, phones, networks -- even RFID-enabled room keys and credit cards. Read More

Best of Google Labs: A Retrospective
As Google shuts down Google Labs, we look back at the many innovations the effort brought us, including Gmail, Google Goggles, Google Earth and Google Maps, among others. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


F5 Upgrades Virtualization Platform

To view this mail in a browser, copy http://links.techwebnewsletters.com/servlet/MailView?ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&j=MTA3NzI4MTAzS0&mt=1&rt=0 into your browser.
TechWeb Networking News Update
http://links.techwebnewsletters.com/ctt?kn=105&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

Friday, July 29, 2011

HIGHLIGHTS:

TOP STORY

- F5 Upgrades Virtualization Platform

ALSO SEE

- Aruba Brings NSA-Grade Crypto To Wireless Networks

ANALYTIC REPORTS

- Flex Time: Storage And File Virtualization Add Resilience

WHITEPAPERS

- Backup and Disaster Recovery Tips for SMBs

TODAY'S MOST POPULAR STORIES @ TECHWEB.COM

- OS X Lion Makes Windows 8 Too Late

FROM THE NETWORK COMPUTING BLOG

- Raytheon And SafeNet Team To Deliver Next Generation Malware Detection Technology

WEBCASTS

- Virtualize Without Compromise

RESOURCES AND EVENTS

- Don't Miss Interop New York

~-~-~-~-~-~-~-~-Advertisement~-~-~-~-~-~-~-~---~-~-~-~-~-
-------------------------------------------------------
This issue is sponsored by HDI Connect
-------------------------------------------------------
http://links.techwebnewsletters.com/ctt?kn=67&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-

TODAY'S TOP STORY

- F5 Upgrades Virtualization Platform
BIG-IP version 11 aims to combine the flexibility of virtualization with the performance of dedicated hardware.
http://links.techwebnewsletters.com/ctt?kn=30&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

ALSO SEE

- Aruba Brings NSA-Grade Crypto To Wireless Networks
With new Suite B cryptography support, Aruba says it aims to make wireless networks as secure as wired.
http://links.techwebnewsletters.com/ctt?kn=31&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- Juniper Taps Microsoft's Muglia To Lead Software Strategy
Newly-created role and high-profile hire underscore how much networks are becoming software driven.
http://links.techwebnewsletters.com/ctt?kn=32&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- Cisco's Math In HP Server Battle Questionable
Just how much progress has Cisco made against HP? Take a close look at the numbers.
http://links.techwebnewsletters.com/ctt?kn=22&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- Cisco Layoffs: 6,500 Jobs Cuts, $1B Expenses Trimmed
Cisco Systems plans to eliminate 9% of its global workforce and will eliminate another 5,000 positions through the sale of a set-top box manufacturing facility.
http://links.techwebnewsletters.com/ctt?kn=24&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- Cisco Launches 60 Watt Ethernet Power
With double the amount of power delivered by Cat 5 networking, new switch modules can power thin clients, IP turrets, and even other switches.
http://links.techwebnewsletters.com/ctt?kn=51&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

MORE NEWS
http://links.techwebnewsletters.com/ctt?kn=18&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ANALYTIC REPORTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Flex Time: Storage And File Virtualization Add Resilience
Storage virtualization enables IT to eliminate storage volumes with hard characteristics, while file virtualization is about abstracting the link between files themselves and their references. The result? Freedom for IT--and users--from regimented storage structures.
DOWNLOAD NOW (REGISTRATION REQUIRED)
http://links.techwebnewsletters.com/ctt?kn=14&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

MORE ANALYTICS
http://links.techwebnewsletters.com/ctt?kn=48&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WHITEPAPERS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Backup and Disaster Recovery Tips for SMBs
With a limited budget and small IT staff, SMBs need a simple, effective backup and recovery strategy for virtual servers and applications. Download this paper to review virtualization implementation challenges and learn best practices for a strong disaster recovery plan.
DOWNLOAD NOW (REGISTRATION REQUIRED)
http://links.techwebnewsletters.com/ctt?kn=9&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

MORE WHITEPAPERS AT TECHWEB DIGITAL LIBRARY
http://links.techwebnewsletters.com/ctt?kn=46&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TODAY'S MOST POPULAR STORIES @ TECHWEB.COM
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- OS X Lion Makes Windows 8 Too Late
Apple and Microsoft race to '"tablify" their desktop operating systems. Guess who's winning?
http://links.techwebnewsletters.com/ctt?kn=49&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- VMware Pricing Outrage: A Closer Look
Many IT admins want to continue over-provisioning memory to virtual machines. But that's not an efficient way to manage the data center.
http://links.techwebnewsletters.com/ctt?kn=54&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- First Look: Google+ Ultimate
Google+ Ultimate lets you control various aspects of how Google+ presents itself in your browser
http://links.techwebnewsletters.com/ctt?kn=53&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

MORE HEADLINES
http://links.techwebnewsletters.com/ctt?kn=37&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FROM THE NETWORK COMPUTING BLOG
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Raytheon And SafeNet Team To Deliver Next Generation Malware Detection Technology
By Mike Fratto
Raytheon Company has entered into an exclusive licensing agreement with SafeNet, Inc., a global leader in information security, to market RShield, Raytheon's advanced malware detection product.
http://links.techwebnewsletters.com/ctt?kn=1&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- Building The Case For Private Clouds
By Joe Onisick
When assessing an IT road map for the next three to five years, you'd be remiss to leave cloud options out of the process. The business agility and potential cost savings of an IT-as-a-service-focused cloud architecture can catapult a business ahead of its competition.

http://links.techwebnewsletters.com/ctt?kn=2&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

- Emerging Multi-Tenant Datacenter Markets Underserved But Heating Up
By Steve Wexler
A new report from Tier 1 Research finds that the emerging North American multi-tenant datacenter (MTDC) markets are underserved but starting to attract interest. The report looks at current supply, demand and utilization metrics, sizing each of the next 14 of the top 20 North American markets – after New York, Los Angeles, Chicago, Washington, Houston and Dallas – by existing supply levels, and identifying the top three datacenter providers in each market.
http://links.techwebnewsletters.com/ctt?kn=3&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

MORE BLOGS
http://links.techwebnewsletters.com/ctt?kn=89&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WEBCASTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Virtualize Without Compromise
Attend this webcast to learn how to avoid the common pitfalls of virtual machine data protection and how you can prepare yourself for a successful virtualization project.

It happens Thursday, July 26, 2011 -- Time: 10:00 AM PT / 1:00 PM ET
More Information & Registration
http://links.techwebnewsletters.com/ctt?kn=99&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

MORE WEBCASTS
http://links.techwebnewsletters.com/ctt?kn=17&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
RESOURCES AND EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- Don't Miss Interop New York
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations -- including cloud, virtualization, security, mobility, and data center advances -- that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25.
It happens in New York City, Oct. 3-7, 2011 -- Register Today!
http://links.techwebnewsletters.com/ctt?kn=45&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

~-~-~-~-~-~-~-~-Advertisement~-~-~-~-~-~-~-~---~-~-~-~-~-
-------------------------------------------------------
This issue is sponsored by HDI Connect
-------------------------------------------------------
http://links.techwebnewsletters.com/ctt?kn=67&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-

This email was sent to: networking.world@gmail.com

Networking News Update
-- Published By TechWeb
http://links.techwebnewsletters.com/ctt?kn=59&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

600 Community Drive
Manhasset, NY 11030

Follow Us On Twitter: http://links.techwebnewsletters.com/ctt?kn=64&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0
Join us On Facebook: http://links.techwebnewsletters.com/ctt?kn=58&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0
LinkedIn: http://links.techwebnewsletters.com/ctt?kn=34&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click below
http://links.techwebnewsletters.com/ctt?kn=40&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

Keep Getting This Newsletter:

Don't let future editions of TechWeb's Networking News Update go missing.

Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

Note: This newsletter uses dynamic URLs. For more information,
please refer to our privacy policy below. We take your privacy
very seriously.

Contact Us At: IWKBTnewsletters@techweb.com

United Business Media LLC
http://links.techwebnewsletters.com/ctt?kn=68&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

Terms Of Service
http://links.techwebnewsletters.com/ctt?kn=69&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

Privacy Statement
http://links.techwebnewsletters.com/ctt?kn=112&ms=MzY4NzI4NDcS1&r=MTM4NTY5MzE2NgS2&b=2&j=MTA3NzI4MTAzS0&mt=1&rt=0

Copyright (c) 2011

The 5 biggest IT security mistakes

Prototype drive-by attack shows mobile threat | Exploit demo on tap at Black Hat could 'make your water undrinkable'

Network World Compliance

Forward this to a Friend >>>


The 5 biggest IT security mistakes
Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it. But to get the job done in the era of virtualization, smartphones and cloud computing, you've got to avoid technical and political mistakes. In particular, here are five security mistakes to avoid. Read More


WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

WHITE PAPER: Fujitsu

New TPC-E Benchmark Results Revealed
A "glue-less" design, where no additional hardware is necessary to run all eight CPUs and all memory slots enable the shortest route between processors, memory modules and I/O hubs inside a single chassis. It's just one of the many reasons Fujitsu servers are leading the way in TCP-E benchmarks and overall price/performance. Read now!

Prototype drive-by attack shows mobile threat
In an analysis of current mobile security, one firm finds 8 percent of apps send off sensitive identifiers and demonstrates a possible drive-by attack vector. Read More

Exploit demo on tap at Black Hat could 'make your water undrinkable'
A demo at Black Hat next week will remotely hack a car alarm, unlock the doors and start the vehicle, but that's just a parlor trick to call attention to a bigger problem that has the Department of Homeland Security on alert. Read More

Sniffer hijacks secure traffic from unpatched iPhones
Almost anyone can snoop the secure data traffic of unpatched iPhones and iPads using a recently-revised tool, a researcher said today as he urged owners to apply Apple's latest iOS fix. Read More

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

IT security's scariest acronym: BYOD, bring your own device
The torrent of smartphones and tablets entering companies has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and new security risks, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too! Read More

Black Hat: Embedded Web servers open printer, scanner security holes
It's fairly simple to find corporate or consumer printers and scanners online and, without breaking into them, get a hold of documents that these devices recently processed. Read More

Debate rages over how to manage personal mobile devices used for work
Increasingly, businesses accept the idea that employees should be able to use their personal mobile devices, such as smartphones and tablets, for work. But debate is raging as to whether these employee-owned devices should be managed and secured exactly as corporate-owned devices might be. Read More

HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference
Aaron Barr, the tech executive who bailed out of a talk at the Security B-Sides conference after the hacker collective Anonymous attacked the company he worked for, is bailing out of yet another conference, this time chased away by his former boss. Read More


WHITE PAPER: Quest Software

5 Tips for Effective Backup & Recovery
In this Quest white paper, discover proven techniques to maximize and secure your virtual investments. Learn to increase backup speed, maximize throughput, and minimize performance drains while reducing costs. Read the white paper today. Read More.

Black Hat Pwnie Award winner will be a criminal
Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees face possible criminal charges. Read More

Swartz, guilty as charged?
Aaron Swartz, founder of progressive action group Demand Progress, has been a bad boy, but how bad? Read More

Is your IT support making you vulnerable to hackers?
Data breaches are more prevalent and more costly than ever. Smarter technologies seem to breed smarter hackers, making it difficult for IT to keep up. But sometimes IT unwittingly helps the bad guys by improperly using core tools, such as remote support mechanisms. Read More

Shrinking IT staff leaves security projects in the lurch
Lately, I've been struggling with trying to get resources for my security projects. As my security program continues to grow and develop, I'm at the stage where I'm rolling out new security technologies, but I'm starting to run into roadblocks when it comes to getting server, network and desktop team support. It's ironic: I got the budget I need to buy security technologies, and I bought the products, but they're not installed yet because we don't have people available to do it. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Happy SysAdmin Day. Are you feeling thankful?

Macs infringe S3 patents, could face U.S. import ban | How dare Twitter try to make money!

Network World Daily News AM

Forward this to a Friend >>>


Happy SysAdmin Day. Are you feeling thankful?
Today is the perfect day to show your appreciation for the unsung heroes who keep corporate desktops, servers and networks running. It's System Administrator Appreciation Day, an annual event thought up by IT pro Ted Kekatos. Read More


WHITE PAPER: Riverbed

Visualization of an Intricate Network
The Depository Trust & Clearing House required enhanced network visibility to support their custody and asset servicing valued at $40 trillion. See how Riverbed provided: • End-to-end visibility of encrypted traffic • Lower MTTR • Application and network activity analysis without requiring probes on every WAN link Learn more!

WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

Macs infringe S3 patents, could face U.S. import ban
A trade agency judge has ruled that some Macs infringe patents held by S3 Graphics and could be barred from the U.S., according to a decision made public Wednesday. Read More

How dare Twitter try to make money!
Twitter today announced that it will soon begin introducing "promoted tweets" - advertising messages, basically -- into user timelines (their catch-all tweet stream), and based on the reaction in some circles you might think that Twitter had literally unleashed a pack of spammers on its user base. Read More

iPhone 5 case moldings purport to show new iPhone design
Is this the iPhone 5 case? It's hard to say, but the above case schematic for the iPhone 5 surfaced earlier this week courtesy of MobileFun. Read More


WHITE PAPER: Splunk

Financial Services Firm Reduces Mean Time to Recovery
Literally every second counts, when downtime costs in the tens of thousands of dollars per minute. Learn why one U.S. financial services firm turned to Splunk and implemented a system that provides one global view of multiple logs to dramatically reduce their MTTR and paid for itself in just one month. Read more.

Who's stealing your data?
An alarming number of employees are exposing their companies to internal sabotage and theft. These aren't people who have been duped, these are people who knowingly violate company policies and -- in some cases -- criminal laws without compunction. Read More

Survey: Most enterprises will be on IPv6 by 2013
IT professionals overwhelmingly say they want their companies to be leaders not laggards in IPv6 adoption, Network World survey finds. Read More

Extending the private cloud: 5 keys to virtualization in a global environment
CIOs tasked with managing virtual servers across a global environment have to clear some hurdles to effectively optimize their infrastructure. Read More


WHITE PAPER: Riverbed

Visualization of an Intricate Network
The Depository Trust & Clearing House required enhanced network visibility to support their custody and asset servicing valued at $40 trillion. See how Riverbed provided: • End-to-end visibility of encrypted traffic • Lower MTTR • Application and network activity analysis without requiring probes on every WAN link Learn more!

Brocade seeks to stop sales of A10 Networks' application switch
Brocade wants to stop sales of a competitor's application controllers it claims infringe on its intellectual property. Read More

Google's two-step authentication goes worldwide
Google has rolled out its two-step authentication sign-in system to 40 languages across over 150 countries. Read More

When all else fails to protect your network, try game theory
If you're in charge of stopping hackers and malware from getting into your network, you might consider the job anything but a game. But security researchers in academia for years have been applying game theory to try to solve network security challenges. Read More

Hadoop growing, not replacing RDBMS in enterprises
The growing need for companies to manage surging volumes of structured and unstructured data is continuing to propel enterprise use of open source Apache Hadoop software. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **