Wednesday, January 25, 2012

Teleconferencing vendors defend their security features

  More of the world's coolest data centers | Motorola files new suit against Apple
 
  Network World Daily News PM

Forward this to a Friend >>>


Teleconferencing vendors defend their security features
Teleconferencing vendors say they're trying to strike the right balance between security and usability after security researchers found they could dial in to the conference lines of major companies and manipulate video cameras to spy on boardrooms. Read More


WHITE PAPER: Cisco Systems, Inc.

The Right Unified Communications Solution
The advantages of today's unified communications are numerous, and there are many choices among solutions. A Cisco white paper is available to help you make the right decision. The paper outlines ten differentiators--from mobile device support to social software--that you should consider before deciding on a unified communications upgrade. Click to continue

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

More of the world's coolest data centers
We take another look to highlight some of the most innovative and unique data centers on the planet Read More

Motorola files new suit against Apple
Motorola on Tuesday filed a new lawsuit in Florida charging Apple with infringing six patents in the iPhone 4S and four of those patents in iCloud. The suit names the same six patents that Motorola cited in its complaint against Apple filed in 2010 in the same court. Motorola tried to add the iPhone 4S and iCloud to the list of Apple products in the original suit but the judge ruled that it was too late to do so. Read More

Wireless bandwidth: Are we running out of room?
Wireless bandwidth is like land in Manhattan -- it's extremely valuable because they're not making more of it. Read More

Will RIM survive?
As Mike Lazaridis and Jim Balsillie step down as co-CEOs at Research in Motion, the company is at a cross roads. Thorsten Heins steps into the CEO chair with many daunting obstacles ahead of him and RIM. Read More


WHITE PAPER: NetSupport Inc

Reducing Hidden Operating Costs Through IT Asset Discovery
After reductions in headcount and procurements have been made, cost-cutting strategies are now turning to internal operations, and many IT decision makers are taking a closer look at indirect, or "soft," costs within these departments. Learn More

IT pros believe data breach harm assessment is more valuable than victim notification, study says
IT professionals believe that assessing the potential harm caused by data breaches is more useful to mitigating the effects of such incidents than notifying affected individuals, according to a survey published on the day the European Union's proposed a 24-hour deadline for data breach disclosures. Read More

Prying government eyes hurting U.S. cloud services: EFF
A blog post from the Electronic Frontier Foundation makes the case that the United States is jeopardizing its position in the worldwide cloud-computing market by failing to provide the kinds of privacy assurances demanded by international laws. Moreover, the authors contend that U.S. officials are speaking out of both sides of their mouths on the issue. From the post: Read More

Federal judges wary of Facebook, Twitter, Google+ impact on juries
The impact of social media such as Twitter, Facebook and Google+ and others on federal juries is a concern that judges are frequently taking steps to curb. According to a study 94% of the 508 federal judges who responded said they have specifically barred jurors from any case-connected use of social media. The Federal Judicial Center was asked by a committee of the policy-making Judicial Conference... Read More

Is Security An Afterthought For NoSQL?
There has been a not so silent debate going on in the security world about the security posture of the NoSQL database products. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Enterasys Embraces Unified Networking – OneFabric Edge, and Another New Farpoint Group White Paper
Enterasys Networks yesterday announced extensions and new products under the umbrella of OneFabric Edge that augment their OneFabric architecture, announced a few months ago. There's quite a bit here - wireless LANs, a new line (the K-Series) of switches, and, most importantly, unified wired/wireless management. Read More

2012 Japan Prize honors cancer fighters, magnet man
The 2012 Japan Prize, one of the world's most prestigious science and technology honors, has been awarded to three American medical experts who are fighting cancer as well as to a Japanese inventor whose magnet technology has implications for energy conservation. Read More

CIA-backed Cleversafe announces 10-exabyte storage system
Object-based storage vendor Cleversafe today unveiled a storage system that can hold 1 billion gigabytes of data under a single domain name. Read More

Senate to Consider Cybersecurity Overhaul
Majority leader Harry Reid is poised to bring long-debated cybersecurity legislation to floor in hopes of broad bipartisan support, according to comments from his senior aide at the State of the Net conference. Read More

 
 
 

SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Apple's secret packaging room
  2. 2012's 25 geekiest 25th anniversaries
  3. Cloud activity to explode in 2012
  4. Google looks to speed up the Internet
  5. iPhone 5 rumor rollup for the week ending Jan. 20
  6. LTE spectrum: How much do the big carriers have?
  7. Fear the tablet: Cisco survey
  8. First look: Windows 8 breaks new ground
  9. U.S. government online security website hacked
  10. Stupid user tricks 6: IT idiocy loves company
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: