Friday, December 09, 2011

Google deploys IPv6 for internal network; zero-day vulnerabilities found in Flash Player

  Holiday gift guide 2011 | Two zero-day vulnerabilities found in Flash Player
 
  Network World Daily News PM

Forward this to a Friend >>>


Usenix: Google deploys IPv6 for internal network
In a project that has taken longer than company engineers anticipated, Google is rolling out IPv6 across its entire internal employee network. Read More


WHITE PAPER: Quest Software

Data Protection Solutions
The simpler a backup plan is to plan and execute, the more likely it is to be done. Read Now!

RESOURCE COMPLIMENTS OF: Cyrusone

Free CyrusOne white paper.
Determine the pros and cons of building, retrofitting or buying data centers with this free data capacity planning white paper from CyrusOne and Data Center Knowledge. You'll discover the top seven IT infrastructure management challenges and learn how colocation can help you minimize risk by offering a secure, scalable solution. Click to continue

Holiday gift guide 2011
The holidays are here, and it's time to rock! With more than 140 products to choose from, let us take you on a journey through our favorite personal technology products and gift ideas for the techie on your list. From phones to computers to the hottest video games, we've got a bunch of great gift ideas. Please peruse and share with friends and family! Read More

Two zero-day vulnerabilities found in Flash Player
Two newly discovered vulnerabilities in Adobe's Flash Player can be exploited to execute arbitrary code remotely, according to advisories from the U.S. Computer Emergency Readiness Team (US-CERT) and various security research companies. Read More

Surveillance tech companies should not sell to despots says EU
Surveillance technology companies have a moral obligation not to sell to repressive regimes, warned Europe's Digital Agenda Commissioner on Friday. Her views were echoed by the U.S. Secretary of State, who said that companies cannot pretend they don't know what their technology is used for in countries like Syria and Iran. Read More

Private investment firm buys Blue Coat for $1.3 billion
Blue Coat Systems has agreed to be bought by a private equity firm for about $1.3 billion, which will buy out shareholders for a 48% premium over what the company's stock sold for yesterday. Read More


WHITE PAPER: FireEye

Attacks get through 95% of networks
Advanced Malware Exposed is a 20+ page ebook providing a broad overview on the major aspects of advanced malware, its underpinnings, its impact on modern business practices, and briefly suggests possible solutions. Read now!

43rd anniversary of the "mother of all demos," first mouse
It has been dubbed the "mother of all demos," but it was way more than that. On December 9, 1968, Douglas Engelbart stepped to the podium at what was called the Fall Joint Computer Conference in San Francisco and showed off the world's first mouse. He also introduced hypertext links, on-screen text editing, video teleconferencing, windowing and a variety of other computing concepts years ahead of their time. Read More

Follow the Mythbusters' bouncing cannonball
Words fail to do justice to the path taken Monday by an errant cannonball fired as part of an experiment by television's Mythbusters, but this map does the trick. Read More

Court dismisses most breach claims against Heartland by banks
A U.S. district court in Texas has dismissed all but one of the claims by several banks against Heartland Payment Systems over a massive data breach the payment processor disclosed almost three years ago. Read More

Anonymous attack on HBGary Federal didn't ruin us, says CEO
When HBGary Federal, had its website hacked and sensitive e-mail exposed by hacktivist group Anonymous last February, it became a question of how Sacramento, Calif.-based security firm HBGary could survive the damage to its reputation. Read More


WHITE PAPER: Splice Communications

The Real Cost of Dealing with Carriers
What is the TCO for your company's data network services and solutions? If you work with one of the large carriers, it's probably a lot higher than you think. Read Now!

3 more use Twitter to commit professional suicide
Three now former congressional aides are jobless this morning in part because they are worthless layabouts who drink on the job, but primarily because they are the latest to forget that Twitter lives on the Internet and tweets are visible to one and all. Read More

NASA iPhone, iPad app lets you watch, research meteors
NASA has released a new smartphone app that lets novices and experts alike track, count and record data about sporadic meteors and meteor showers anywhere in the world. Read More

Impact of hard drive shortage to linger through 2013
Hard disk drive supply shortages in the wake of Thailand flooding will continue to affect consumers, computer system manufacturers and corporate IT shops into 2013, according to market research firm IDC. Read More

6 hot IT jobs that will pay well in 2012
IT professionals looking for new jobs in 2012 are in luck: The job market is robust across the U.S., and IT salaries in a variety of fields are on the rise. Here are the six IT jobs that IT staffing industry executives expect to be in greatest demand in the coming year. The best part? Many of these jobs are also fun. Read More

 
 
 

SLIDESHOWS

25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known projects he thinks IT folks will love. What follows are his picks, along with a few of our own.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Microsoft plans 20 patches next week
  2. Cisco storms back in switching
  3. How dangerous are Facebook, Twitter and search engines
  4. The worst web design mistakes, and how to prevent them
  5. 10 most powerful cloud companies
  6. Padlock salesman trades 30-pound sample case for 1.35-pound iPad
  7. Microsoft: We can remotely delete Windows 8 apps
  8. What's really going on with Carrier IQ on your phone
  9. Kindle Fire likely to be a hit despite middling reviews
  10. CNET accused of wrapping malware in Windows installer for Nmap security tool
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment