Tuesday, February 07, 2012

Centrex: It's alive (for now)!

  Quick look: Bill Gates' spanking new interactive Visitors Center | Symantec verifies stolen source code posted by Anonymous is "legitimate"
 
  Network World Daily News PM

Forward this to a Friend >>>


Centrex: It's alive (for now)!
Centrex is a lot like the talking plague victim from Monty Python's "Holy Grail": It's not quite dead yet. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Quick look: Bill Gates' spanking new interactive Visitors Center
Bill & Melinda Gates Foundation opens Seattle complex for inspiration Read More

Symantec verifies stolen source code posted by Anonymous is "legitimate"
Symantec is in an ongoing fight against hackers in the group Anonymous that last January attempted to extort a payment of around $50,000 from Symantec in exchange for not publicly posting stolen Symantec source code they had stolen for various older Symantec security products dating to 2006. Read More

Anonymity bites Anonymous in attempt to extort Symantec
There's something ironic about the anonymity afforded by the Internet putting a self-proclaimed member of the hacker group Anonymous in the position of negotiating extortion demands with a law enforcement officer posing as a Symantec employee. Read More

Apple warns iOS developers: Don't monkey with App Store rankings
Apple has warned iOS developers not to use services that manipulate App Store rankings to make their iPhone and iPad apps seem more popular than they really are. Read More


WHITE PAPER: Shoretel

Investigating UC Vendors
This must-read publication features independent research from Gartner, providing a wealth of information around best in breed Unified Communication systems. 12 Unified Communications vendor ratings, along with their strengths and cautions, are provided. Read now!

HP moves load testing software to the cloud
With the release of its new LoadRunner in the Cloud application load testing solution, HP aims to provide the flexibility of software-as-a-service in tools that traditionally entailed substantial investments to implement. Read More

5 ways to secure your Facebook profile in a post-Timeline world
With the ongoing rollout of Facebook's Timeline feature, security and privacy have never been more important to your digital life. The new layout presents all of your current and past activities on Facebook -- posts, photos, comments, likes and so on -- in a handy timeline format to anyone with access to your profile, which may include friends of friends, colleagues, executives at your company, a potential future boss ... well, you get the idea. Read More

New Juniper routers converge the access net
Juniper Networks this week has unveiled access routers designed to provide an on-ramp to the service provider network from residential, business and mobile networks. Read More

Droid 4 smartphone hitting shelves Feb. 10 for $200
The fourth iteration of Motorola's signature Droid series is hitting the shelves for Verizon customers this Friday. Read More


WHITE PAPER: HP, Microsoft & Intel

HP Business Data Warehouse Appliance
The HP Business Data Warehouse Appliance optimized for SQL Server 2008 R2 is designed and tuned for data marts and small-scale data warehouses, providing a single view of data across your business. Learn more

FTC warns background screening mobile apps may be unlawful
The Federal Trade Commission this week said it sent letters to six unidentified mobile applications makers warning them that their background screening apps may be violating federal statutes. Read More

Accessing the Internet by mobile device doubled in 2011, data shows
Over the past 12 months, mobile access to the Internet nearly doubled to 8.5%, not counting tablets, according to data released this week by StatCounter, a Web analytics company. Read More

Controlling Liquor Loss with Linux
The Replay Lounge in Lawrence, Kansas, ranked number 64 on Esquire's Best Bars in America 2011 list and landed spot number 31 on Complex Magazine's 2010 list of the 50 best college bars in America. Read More

Facebook IPO: The Heftiest Paydays
With a possible valuation of $100 billion, Facebook's IPO filing could make a lot of people very, very rich (or richer). Here's a look at the breakdown of who could get what, from Mark Zuckerberg to Bono -- yes, Bono. Read More

 
 
 

SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Anonymous claims to have released source code of Symantec's pcAnywhere
  2. Highly anticipated net virtualization startup Nicira exits stealth mode
  3. Programmer personality types: 13 profiles in code
  4. The When, Where and How of Cisco vs. Microsoft for Unified Communications
  5. Global broadband snapshot: Hong Kong throttles the rest of the world
  6. Mobile device management: Apple's extra little tricky requirement
  7. IT job spotting: Top 20 metro areas for tech jobs
  8. In-flight Wi-Fi struggling to gain altitude
  9. Hot authentication tools
  10. Data breach? Blame your third party's remote access systems
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: