Thursday, October 11, 2012

Legal and technical BYOD pitfalls highlighted at RSA security conference

  7 spooktechular haunted house ideas | iPad mini tablet said to be Wi-Fi only
 
  Network World Daily News PM

Forward this to a Friend >>>


Legal and technical BYOD pitfalls highlighted at RSA security conference
Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet. Read More


RESOURCE COMPLIMENTS OF: RIM

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WEBCAST: HP Intel VMware

A Lower Entry Cost for Desktop Virtualization
High entry costs and overall complexity have prevented many SMBs from taking advantage of the benefits of client virtualization. Now HP and VMware have teamed to bring desktop virtualization that delivers results right out of the box. Learn More

7 spooktechular haunted house ideas
This Halloween, make yours the geekiest haunted house on the block Read More

iPad mini tablet said to be Wi-Fi only
The widely expected smaller version of the Apple iPad tablet will have Wi-Fi but not cellular connectivity, according to unnamed sources in a news story about the so-called iPad mini. But it's not clear why that would be the case. Read More

Conficker worm still being tracked, but evidence collection slows
The notorious malware known as the Conficker worm still infects computers, a sort of wild horse with no rider, but investigators appear no closer to finding its creator. Read More

Presidential candidates quiet on cyber policy
Federal cyber policy didn't come up during the first presidential debate. It likely won't come up in the next two either. But issues ranging from cybersecurity to privacy to regulation ought to be on the debate agenda, because there are some differences between President Obama and his Republican challenger, Mitt Romney. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

MIT's newest research center to focus on mobile technologies
The Massachusetts Institute of Technology is aiming for a leadership position in mobile technology with the launch on Thursday of its latest research center, Wireless@MIT. Read More

5 Things You Need to Know About Risk Management
Risk is everywhere and if you're just trying to minimize it within IT, you're taking an additional risk. Follow these tips and learn how to take an intelligent approach to risk management. Read More

Looking for Daddy Techbucks: Parallella needs funding
Amanda Palmer, known to her fans by the soubriquet "Amanda ****** Palmer" and wife of noted author Neil Gaiman, raised almost $1.2 million on Kickstarter back in May. Read More

INSIDER
Social media gains in regulated industries
Even if you're knee-deep in regulations, it is possible to get the benefits other kinds of companies do from being active in social media. Here's how some approach it. Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

Those Windows 8 TV ads? They're real.
Microsoft copyright claims have forced the takedown of several purported Windows 8 TV ads that somehow leaked to the Web. While Microsoft's copyright protection could just be aimed at defending the Windows 8 name and not the actual commercials, the preponderance of evidence indicates the ads are real and they are what Microsoft wants to protect. Read More

Firefox 16 removed from installer page after vulnerability found
Mozilla has temporarily removed Firefox 16 from the current installer page after it found a security vulnerability in the new version of its browser, it said on Wednesday. Read More

BMC to package Amazon cloud services as part of expanded partnership
Systems management company BMC has scored somewhat of a coup by announcing an expanded partnership with Amazon Web Services, which many consider the leading public cloud provider. Read More

Best Free Smartphones Available with a New Contract
Older iPhones, Lumia 900 among free smartphones on the market Read More

Acqui-Hire Trend Turns Startups Into IT Talent Pools
Wed, October 10, 2012 - More large tech companies are adopting the attitude 'if you can't hire the right developers and engineers, acquire them' and are buying startups with absolutely no interest in the products they develop. Read More

 
 
 

SLIDESHOWS

Top 10 cloud jobs
Researchers at Dice.com have crunched the numbers to come up with a list of the top 10 most available jobs in the cloud.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. What are grand technology and scientific changes for the 21st century?
  2. The 9 most endangered IT career paths
  3. Did 'Completely Wrong' Romney Google bomb himself?
  4. Huawei: Separating fact from fiction
  5. Juniper fortifies network edge with new routers
  6. .xxx to launch porn search engine
  7. The better hire: the 50-year-old IT veteran or the fresh grad?
  8. Microsoft hints at the death of Windows service packs
  9. Cisco ONE is on track
  10. Microsoft: Users trying to get something for nothing wind up with malware
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment