Friday, November 30, 2012

iPhone 6 rumor rollup for week ending Nov. 30

  Infuriated by Internet shutdown, Anonymous declares war on Syrian government websites worldwide | Hottest Android news and rumors for the week ending Nov. 30
 
  Network World Daily News PM

Forward this to a Friend >>>


iPhone 6 rumor rollup for week ending Nov. 30
Cyber Monday, by Friday, is just a dim memory, and a dull ache caused by the absence of the Next iPhone. Read More


RESOURCE COMPLIMENTS OF: APC by Schneider Electric

Deploy your IT space with speed, not complexity
Protect your IT system uptime easily your IT deployed with APC by Schneider Electric InfraStruxure™ solutions. Our simple, adaptable, and manageable all-in-one physical infrastructure is designed as an easy-to-deploy system to allow for flexible management and physical IT deployment and, by extension, system uptime. Make the most of your IT space! Download our top three solution guides today and enter to win an iPad® 2!

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

Infuriated by Internet shutdown, Anonymous declares war on Syrian government websites worldwide
The hactivist group Anonymous reacted angrily to the Internet shutdown yesterday in Syria, an act attributed to the embattled regime of Syrian President Bashar Assad in the civil war there. Anonymous basically declared war on the Syrian regime, saying it intends to obliterate "all Web assets belonging to the Assad regime that are NOT hosted in Syria," starting today. Read More

Hottest Android news and rumors for the week ending Nov. 30
The most disturbing thing about online shopping, to me, has always been just how easy it is. A couple of clicks, a brief glance at a credit card number, and bang -- there's an order of chicken wings on the way to your door. It's too easy, frankly, as my bank account balance and expanding waistline can attest. Read More

Visa creating 800, seemingly well-paying, IT jobs in Austin
Credit card issuer Visa USA plans to create a global IT center in Austin, Texas, and hire about 800 workers to run it. Read More

INSIDER
Tech job market on the upswing
To see the state of the job market for tech workers, just look at the headlines over the past few months: Read More


WHITE PAPER: Condusiv Technologies (formerly Diskeeper Corporation)

What Really Happens to Your Deleted Files
You might be surprised! In this White Paper, many of the common and incorrect assumptions about file protection and recovery are detailed as well as a look Condusiv Technologies' Undelete 10, which fills many of the gaps left by other "recovery" methods. Read Now!

DARPA program aims to find, shut backdoor, malware holes in commercial IT devices
It is likely every security IT person's nightmare: the new mobile phone, network router or computer they just tied into the network actually has a secret backdoor that lets the malicious users or governments have unfettered access to the company's assets. Read More

14 of the most useful Linux websites
Looking to learn more about open source and free software? You can't go far wrong with our list of sites Read More

The Top 10 Priorities for CIOs in 2013
As we head into the new year, IDG Enterprise CEO Michael Friedenberg pairs his list of favorite quotes with questions to spark your thinking Read More

Adidas Heads to the Cloud to Control IT Spending
The sporting goods unit in Latin America implemented cloud-based procurement software in a multinational environment. It wasn't easy. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Thursday November 29th at 2:00pm Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

VA still lags on encryption
Six years after major data breach, a report finds the agency has only 16 percent of its computers running encryption software Read More

Five ways the iPad beats the Surface RT
This isn't the first year that tablets are a hot gift item, but it is the first holiday season that enough serious contenders make the buying decision tougher. Following my reasons you should consider the Microsoft Surface with Windows RT over the Apple iPad, here are features and benefits that give the iPad an advantage over the Surface with Windows RT. Read More

Visualizing Syrian Internet blackout
Read More

Syrians without internet offered Google's Speak2Tweet
Google is promoting the Speak2Tweet service it originally launched with Twitter during Egypt's revolution-related internet outage almost two years ago for the use of Syrians whose internet and other communications were crippled this week. Read More

How much would you pay for a Windows Surface Tablet?
I am not a Microsoft hater. I scoff when I read some of the articles recently about Microsoft being irrelevant and toast because of the post-PC era bringing a Windows Apocalypse upon us. I actually believe that if you are a top 3 player in a given category, you are successful. Microsoft will continue to be top 3 in a wide range of markets. Read More

Products of the week 11.26.12
Our roundup of intriguing new products from companies such as HP and Blue Coat Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Chinese media attack Cisco
  2. Consumer Reports names AT&T worst mobile service provider
  3. Cisco's internal security team fights to corral BYOD, malware and Wild West environment
  4. Microsoft tweaks, then silences IE haters
  5. Microsoft Surface RT or Surface Pro?
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. 14 of the most useful Linux websites
  8. New Linux smartphone OS 'Sailfish' passes the test
  9. 10 hard truths IT must learn to accept
  10. Android Jelly Bean resurrected my HP Touchpad
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Amazon's Vogels: Rethink App Dev | 'Future Cities' IT Priorities

If you have trouble viewing this email, read the online version.

TechWeb
NETWORKING UPDATE 
Join the community
Facebook Twitter LinkedIn
  Friday, November 30, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Amazon's Vogels Challenges IT: Rethink App Dev
By Charles Babcock
Amazon Web Services CTO says promised land of cloud computing requires a new generation of applications that follow different principles.

MUST READ
Future Cities: IT Priorities For Urban Transformation
City planners and their IT teams are setting big goals -- and facing big challenges -- in the development of tech-enabled "Future Cities," our survey results show

Dwolla Shakes Up Online Payments
Online payment darling Dwolla adds three new services as it tries to speed up merchant and consumer acceptance of its electronic transactions.

Researchers Steal Cloud Computing Power Via Browsers
Security researchers demonstrate that cloud computing can be taken at no cost, if you know where to find the processing cycles.

Hire A Data Science Team, Not A Data Scientist
Assembling a group of talented people with diverse skills is the best way to meet your data science needs, says Deloitte director.

Ballmer: Hardware Key To Microsoft's Future
Facing tablet pressure, Microsoft CEO tells shareholders that company needs to bring hardware and software together to speed up innovation.

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Research: IaaS Buyer's Guide
Infrastructure-as-a-service lets companies focus on their core competencies, instead of on installing and maintaining computer hardware. But with so many vendors in the market, how do you know which one is the best fit for your company? We look at 9 IaaS providers and 10 services categories to help IT pros answer that question.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
The Smart Approach to IT Resource Management
Learn the smart approach to IT Resource Management. This whitepaper identifies why effective resource management is crucial for any IT department.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

10 Cloud Computing Pioneers
Cloud computing has rewritten decades of technology rules. Take a closer look at 10 innovators who helped make it possible.

Ballmer: Hardware Key To Microsoft's Future
Facing tablet pressure, Microsoft CEO tells shareholders that company needs to bring hardware and software together to speed up innovation.

10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.

8 Cloud Tools For Road Warriors
Cloud services have become indispensable for doing business on the move. Check out these valuable tools.

Netflix Wants You To Adopt Chaos Monkey
Netflix has made its own automated disaster testing service, Chaos Monkey, available as a free public download. Should you turn it loose on your own systems?
 

WEBCASTS:

Service Virtualization: Real World Challenges, Real World Perspectives
Join this interactive panel discussion to hear how industry leaders are employing Service Virtualization as an essential part of their quality management strategy. It happens Wednesday, December 5, 2012
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
InformationWeek 2013 Outlook Survey
We are conducting our annual Outlook Survey to explore how IT leaders are planning their priorities and budgets for 2013. The results of the survey will appear in an upcoming issue as well as in an in-depth report. Take our survey now and enter to win one Samsung Series 5 Chromebook.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to networking.world@gmail.com

InformationWeek Networking Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Networking Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Cisco’s internal security team fights to corral BYOD, malware and Wild West environment

  Products of the week 11.26.12 | PGP Corp. co-founder's startup targets cloud authentication
 
  Network World Compliance

Forward this to a Friend >>>


Cisco's internal security team fights to corral BYOD, malware and Wild West environment
Many organizations have a computer security incident response team (CSIRT) that swoops into action to battle malware outbreaks, other types of cyberattacks and possible insider threats, and at networking giant Cisco, that CSIRT team is made up of about 60 people trying to protect a business with about 75,000 employees. Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

Products of the week 11.26.12
Our roundup of intriguing new products from companies such as HP and Blue Coat Read More

PGP Corp. co-founder's startup targets cloud authentication
When Phil Dunkelberger co-founded PGP Corp. in 2002 with Jon Callas, it was to acquire the codebase for the famous encryption technology known as "Pretty Good Privacy" which had been sold to Networks Associates in 1997. That proved a good move for public-key encryption, and now Dunkelberger says his next project -- the formation of a company called Nok Nok Labs -- involves a revolutionary way to support authentication in corporate networks and the cloud. Read More

INSIDER
BYOD: Where the costs are
Few technology trends have inspired as many misgivings -- and as much misinformation - as BYOD, or "bring your own device." Is the idea of allowing employees to purchase and use their own laptops and mobile devices a security nightmare? A productivity boon? A drain on the service desk? And perhaps the biggest question of all, a cost-savings nirvana? Read More


WEBCAST: Fluke Networks

Solve QoS Problems in VoIP Call Centers
View this short video "Maintaining High VoIP Quality for Call/Contact Centers with Network Time Machine", to learn more about how carrier and call center customers are using Network Time Machine to rapidly determine problem domain and identify choke points in the network. View Now!

'Spear phishing' the main email attachment threat
Some 91 percent of cyber attacks begin with a "spear phishing" email, according to research from security software firm Trend Micro. Read More

Damage from attack on power grid would surpass Sandy
The U.S. is in urgent need of a nationwide strategy to protect its highly vulnerable electric grid from succumbing to a cyberattack that could cause far more damage than Hurricane Sandy, a recent report said. Read More

Internet Explorer 10's 'do not track' risks upsetting users, finds poll
Microsoft's decision to turn on Internet Explorer 10's 'do not track' setting by default could turn some consumers against the browser if it interferes with features such as password retention and autofill, a new survey has concluded. Read More


WHITE PAPER: Capella University MP

Explore Capella University IT/MBA Programs
As an accredited university, Capella University offers online graduate degrees in business, education, human services, information technology, psychology, public health, and public safety and undergraduate degrees in business, information technology, and public safety. Learn More.

Latest Java zero-day exploit renews calls to disable it
A zero-day Java exploit found for sale in the criminal underground has renewed calls to disable the cross-platform runtime environment in Web browsers. Read More

Construction company, bank, settle dispute over $345,000 cyber heist
A Maine construction company that sued its bank after losing $345,000 in an online banking heist settled its dispute after a protracted legal battle that raised questions about a bank's responsibility in protecting customer accounts against cyber fraud. Read More

10 tips for implementing IPS securely
An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network traffic it can shut down attacks, typically by blocking access from the attacker or blocking access to the target. In some cases, the IPS can talk to the firewall to block an attack. Read More

INSIDER
Tech job market on the upswing
To see the state of the job market for tech workers, just look at the headlines over the past few months: Read More

10 hard truths IT must learn to accept
Unsanctioned devices, compromised networks, downtime -- today's IT is all about embracing imperfections Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. GOP Congressman's attempt to look cool on Reddit backfires
  2. 10 hard truths IT must learn to accept
  3. 14 of the most useful Linux websites
  4. Is Windows 8 really a sitting duck for malware?
  5. Latest Java zero-day exploit renews calls to disable it
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. Alcatel-Lucent to take on Cisco, VMware in crowding SDN field
  8. Android Jelly Bean resurrected my HP Touchpad
  9. Talking about Linux online: There are, in fact, stupid questions
  10. Mobile browser vulnerability lets hackers steal cloud computing time
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **