Tuesday, November 15, 2011

CI pinpoints 200 millionth piece of cloud-based malware

First look: Firefox 8 adds Twitter search, tightens add-on controls | Fujitsu to team with Whamcloud in Lustre development

Network World Cloud Computing

Forward this to a Friend >>>


CI pinpoints 200 millionth piece of cloud-based malware
The good news is that Collective Intelligence (CI), the engine for Internet security created in 2006 by Panda Security's malware research laboratory, recently processed its 200 millionth malware file via the cloud. That's also the bad news. Read More


RESOURCE COMPLIMENTS OF: i365

"Got Your Backup. Recovery. And Back."
"Looking for an ultra-reliable, proactive partner? One who's passionate about keeping your critical data safe and available? EVault®, the leader in cloud-connected storage services, always has your back. With on-premise, cloud-based, and seamlessly integrated hybrid solutions. Perfectly optimized for flexible multi-platform, multi-site deployment." Click to continue

WHITE PAPER: IBM

A Smarter Approach to CRM
With instant access to information, customers expect a purchase experience that matches the ease and speed of the information-gathering experience. Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Read Now

First look: Firefox 8 adds Twitter search, tightens add-on controls
Mozilla debuted Firefox 8 just six weeks after Firefox 7, in keeping with its rapid release cycle. Among the changes are new controls for preventing unwanted add-ons and the addition of Twitter as a choice in the Firefox's search bar. The new release also fixes some bugs. Read More

Fujitsu to team with Whamcloud in Lustre development
Fujitsu says it will work with Whamcloud to develop new features for the open-source Lustre file system aimed at high-performance computing. Read More

Salesforce.com to buy cloud computing services company
Salesforce.com has signed a definitive agreement to acquire Model Metrics, a cloud computing consulting and services company, with practices in the areas of mobile computing and social technologies. Read More


WHITE PAPER: BMC

Three Steps to Effective Cloud Planning & Design
Before you build your cloud, there are many considerations. Are there security requirements? Compliance rules? Will you use public cloud resources as well? Learn more about how to plan a cloud effectively – from defining requirements to identifying the costs - in this compelling white paper from BMC Software. Learn More!

IBM targets managed security service at iOS, Android, Windows, BlackBerry smartphones
IBM is offering a cloud-based managed service for mobile devices that will let IT managers exert management and security controls over devices based on Apple iOS, Google Android, the RIM BlackBerry, Symbian and Microsoft Windows Mobile. Read More

CA takes to the cloud for identity management
CA Technologies has gotten its feet wet with cloud-based security before, but now the company is moving further in with a package of cloud based identity and access control services. Read More

Symantec's cloud-based security service supports Microsoft Lync
Symantec today widened its cloud-based security service to include Lync, Microsoft's latest instant-messaging client, so that enterprises using Lync can do anti-malware filtering and exert security controls for blocking inappropriate content along with basic data-loss prevention. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Apprenda updates software for private PaaS
Apprenda, the developer of software for creating private platform-as-a-service clouds, is adding features that offer users better control over applications running on the platform. Read More

Deploy a private PaaS to fet the best for your enterprise cloud
IT management and developers always face tension around choice. Managers worry that too much choice can decrease collaboration between teams, increase the code maintenance burden, and reduce interoperability between applications and the platforms they are deployed on. Developers, on the other hand, want to be able to pick the best tools that get the job done. Read More

Apple's iOS 5 update: No battery drain fix?
Some iPhone 4S users are still complaining about rapid battery drain following Apple's iOS 5.0.1 system update that began rolling out to users Thursday. IOS 5.0.1 was supposed to fix several bugs that caused some iPhone 4S and older iPhone devices to rapidly discharge their batteries. The update also brings more multitouch gestures to the original iPad, several bug fixes for iCloud, and improved Siri voice recognition capability for Australian accents. Read More

RightScale cozies up to OpenStack, SoftLayer
RightScale is adding OpenStack and SoftLayer to the list of cloud services that can be managed from its RightScale Cloud Management Platform. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will IT certs get you jobs and raises? Survey says yes
  2. DARPA program to alter security authentication techniques
  3. Gartner: The top 10 strategic technology trends of 2012
  4. Cisco girds for Huawei's U.S. entry
  5. iPhone 5 rumor roll-up for the week ending Nov. 11
  6. Top 10 Android smartphone browser alternatives
  7. How IBM started grading its developers' productivity
  8. Cisco's Q1 solid, but access routers, Nexus 7000 lagging
  9. Fabric wars: Cisco vs. Brocade vs. Juniper
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: