Monday, November 14, 2011

Do you give up a reasonable expectation of privacy by carrying a cell phone?

  Kindle Fire: Up Close With Amazon's Media Tablet | Google adds 24x7 phone support for all Apps business customers
 
  Network World Daily News PM

Forward this to a Friend >>>


Do you give up a reasonable expectation of privacy by carrying a cell phone?
At a secret conference open only to law enforcement and intelligence agencies, vendors offered cell-phone capturing equipment and lessons about location tracking via mobile phones. Does such equipment, however, violate the Fourth Amendment? Read More


RESOURCE COMPLIMENTS OF: CITE Conference

R U ready for the consumerization of corporate IT?
Social media. Mobile devices. Web apps. Desktop virtualization. They're transforming corporate computing. R U ready? Attend Consumerization of IT in the Enterprise (CITE) March 4-6, 2012 in San Francisco and learn how to manage this major trend to unleash productivity, while mitigating risk and safeguarding enterprise security. Learn more.

WHITE PAPER: BMC

Three Steps to Effective Cloud Planning & Design
Before you build your cloud, there are many considerations. Are there security requirements? Compliance rules? Will you use public cloud resources as well? Learn more about how to plan a cloud effectively – from defining requirements to identifying the costs - in this compelling white paper from BMC Software. Learn More!

Kindle Fire: Up Close With Amazon's Media Tablet
The Amazon Kindle Fire, one of the most anticipated tablets of the season, ships Tuesday. Here's a preview of some of its notable features. Read More

Google adds 24x7 phone support for all Apps business customers
Addressing a major source of complaints with its Apps suite, Google has announced that it will now offer around-the-clock phone support for the core components in the Apps for Business version of the hosted collaboration and communication suite. Read More


WHITE PAPER: Cisco Systems

Get ROI from video collaboration
This whitepaper is designed for IT and Business leaders to understand the impact of IP video applications and technologies and the benefit of taking an architectural approach to video. View Now

F-Secure finds malware signed with stolen digital certificate
Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution. Read More

Top500 list passes another milestone: 10 petaflops
Japan's K Computer has retained its pole position on the Top500 list of fastest supercomputers and become the first machine on the list to achieve performance of more than 10 petaflops. Read More


WHITE PAPER: Oracle

BPM SOA and Web 2.0: Business Transformation or Train Wreck?
The challenges faced by today's government agencies and commercial operations are many and varied. Fortunately for them, the convergence of a trio of technologies and business practices—business process management (BPM), service-oriented architecture (SOA), and Web 2.0—is providing a solution. Learn more.

Apple's iOS remains top draw for devs, but interest in Fire 'remarkable,' says pollster
Although developer enthusiasm for Apple's iOS is still strong, app programmers are extremely interested in Amazon's Kindle Fire, which goes on sale Tuesday, a new survey from Appcelerator said. Read More

IANA contract is up for renewal, only to U.S. bidders
A new tender document for the Internet Assigned Numbers Authority (IANA) aims to strengthen the transparency, independence and accountability of the next IANA contractor. Read More

IBM targets managed security service at iOS, Android, Windows, BlackBerry smartphones
IBM is offering a cloud-based managed service for mobile devices that will let IT managers exert management and security controls over devices based on Apple iOS, Google Android, the RIM BlackBerry, Symbian and Microsoft Windows Mobile. Read More

Top-secret Google X lab rethinks the future
Google is running a secret research lab in the San Francisco area where they're building robots and re-imagining the future, the New York Times reported yesterday. Read More

 
 
 

SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will IT certs get you jobs and raises? Survey says yes
  2. DARPA program to alter security authentication techniques
  3. Gartner: The top 10 strategic technology trends of 2012
  4. Cisco girds for Huawei's U.S. entry
  5. iPhone 5 rumor roll-up for the week ending Nov. 11
  6. Top 10 Android smartphone browser alternatives
  7. How IBM started grading its developers' productivity
  8. Cisco's Q1 solid, but access routers, Nexus 7000 lagging
  9. Fabric wars: Cisco vs. Brocade vs. Juniper
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: