Tuesday, February 07, 2012

Anonymous: We leaked Symantec's pcAnywhere source code

Global broadband snapshot: Hong Kong throttles the rest of the world | IT job spotting: Top 20 metro areas for tech jobs

Network World Daily News AM

Forward this to a Friend >>>


Anonymous: We leaked Symantec's pcAnywhere source code
Hacker group Anonymous claimed late Monday that the source code of Symantec's pcAnywhere had been uploaded on The Pirate Bay site. Read More


WHITE PAPER: Oracle

Migrating Your Legacy IBM Database Environment
Download this guide to ensure a seamless migration and take advantage of reduced costs associated with extremely efficient day-to-day database administration. Learn More!

RESOURCE COMPLIMENTS OF: Diskeeper Corporation

V-locity 3: Prevents wasted I/Os to SAN
See for yourself how much better your SAN performs when the NTFS file system has been optimized. Download trialware now. V-locity automatically prevents unnecessary I/O generation at the initial data write/read with zero resource conflicts. Servers run faster and more efficiently. Try it free for 30-days.

Global broadband snapshot: Hong Kong throttles the rest of the world
Anyone who thinks their Verizon fiber connection is fast ought to spend a week hanging out in East Asia. Read More

IT job spotting: Top 20 metro areas for tech jobs
Dice.com reports the top 20 metro areas for tech jobs, based on how much IT pros are getting paid and the number of open positions. Read More

Data breach? Blame your third party's remote access systems
An in-depth study of data-breach problems last year where hackers infiltrated 312 businesses to grab gobs of mainly customer payment-card information found the primary way they got in was through third-party vendor remote-access applications or VPN for systems maintenance. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Amazon said to be planning retail stores
A central appeal of shopping at Amazon has always been that you get to transport yourself to their store using a Web browser instead of an automobile. But no one ever said the two modes had to be mutually exclusive. Read More

4 Ways to Prevent Domain Name Hijacking
A company's domain name is one of its most valuable assets, yet businesses do little to protect them from being hijacked. As DNS hijacking becomes more prevalent, IT leaders need to understand how they can protect their companies from the damages domain hijacking wreaks. Here are four tips. Read More

In-flight Wi-Fi struggling to gain altitude
At first blush, it's another one of those, "Sure, it will happen ... eventually," type of situations. I mean does anyone envision a commercial air fleet without Internet service 20 years down the runway? Read More


WHITE PAPER: NetSupport Inc

Reducing Hidden Operating Costs Through IT Asset Discovery
After reductions in headcount and procurements have been made, cost-cutting strategies are now turning to internal operations, and many IT decision makers are taking a closer look at indirect, or "soft," costs within these departments. Learn More

Powerline Carrier – Close, but Likely No Cigar
I have been experimenting with powerline carrier modems for many years, going back to the first 10 Mbps products of more than a decade ago. These do exactly what you think - turn the electrical wiring in your house into a virtual LAN cable. In one sense, we might even call this wireless, since we're using somebody else's wire. Read More

Symantec releases faster next-gen NetBackup, Backup Exec software
Symantec announced new versions of its flagship backup applications for SMBs and the enterprise adding more support for virtual machines, a cloud storage offering and integration of snapshot and backup management Read More

LinkedIn Tip: How to Opt-Out of Social Advertising
LinkedIn's social ads, which automatically opt you in, may use your name and photo to promote brands that you follow. Here are step-by-step instructions for how you can opt-out. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. IT job spotting: Top 20 metro areas for tech jobs
  2. Highly anticipated net virtualization startup Nicira exits stealth mode
  3. The When, Where and How of Cisco versus Microsoft for Unified Communications
  4. The Apple iPad quiz
  5. Apple forcing IT shops to 'adapt or die'
  6. Cisco Ethernet switches make big leap to 40/100G
  7. Why the House spectrum bill should be ditched: Q&A with Reed Hundt
  8. How NOT to get a job 101: Hack Marriott, extort execs for work
  9. DARPA wants novel security technology to protect SCADA, embedded systems
  10. In-flight Wi-Fi struggling to gain altitude

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: