Tuesday, December 24, 2013

Report on NSA 'secret' payments to RSA fuels encryption controversy

14 of the most useful Linux websites | Seven free, open source video editors for Linux

Network World Network Architecture

Forward this to a Friend >>>


Report on NSA 'secret' payments to RSA fuels encryption controversy
The U.S. National Security Agency (NSA) paid US$10 million to vendor RSA in a "secret" deal to incorporate a deliberately flawed encryption algorithm into widely used security software, according to a Reuters report that is reigniting controversy about the government's involvement in setting security standards. Read More


WHITE PAPER: Dell

Tech Brief: Exchange 2013 Data Loss Prevention
Protecting your company's critical data is a critical, mandatory part of an Exchange administrator's tasks. In this white paper, learn about the data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Read now!

WHITE PAPER: IBM

Application Performance Management Software Vendor Shares
This IDC study examines leading vendor shares and market trends in the worldwide APM software market during 2012. Read Now

14 of the most useful Linux websites
Looking to learn more about open source and free software? You can't go far wrong with our list of sites Read More

Seven free, open source video editors for Linux
Read More


WEBCAST: Novell

Putting Mobile Employees to Work
Mobile Employees in the workplace. Watch this webcast. Click Here>> Learn More>>

What's Microsoft going to look like after Ballmer?
Like a juggler walking away with dozens of objects suspended in the air, Steve Ballmer is leaving his successor at Microsoft not only a tough act to follow but an even tougher act to continue. Read More

Shopping for last-minute tech gifts? Here's our one stop guide
You've only got a few more shopping days until Christmas, and you're still not sure what to get--or even where to start. Read More


WHITE PAPER: AT&T

Four Keys to Choosing a Holistic Mobile Management Solution
Getting peak value from mobile technologies takes a wide range of applications and services. Here are four capabilities every end-to-end mobile management solution must include. Learn More

Enterprise Security Professionals Offer Their Mobile Computing Security Advice
In 2012, ESG research asked 315 security professionals working at enterprise organizations (i.e. more than 1,000 employees) about the impact of mobile computing on security management and operations. It turned out that the impact was pretty substantial, 30% of organizations say that mobile devices made security management and operations "much more difficult," while 32% say that mobile devices... Read More

Need help with a networking problem?
Google has a relatively new feature (it launched in November) named Helpouts, which is a program that's meant to connect people who have problems with problem solvers. It uses a Google+ account and other Google tools like Hangouts. Read More

Huawei sends 400Gbps over next-generation optical network
Huawei Technologies and Polish operator Exatel have tested a next-generation optical network based on WDM (Wavelength Division Multiplexing) technology and capable of 400Gbps throughput. Read More

Bah humbug. IT pros expect to work over holiday break
This year, 46% of IT pros will be on-call over the holidays to troubleshoot network, security and application problems, according to net management vendor Ipswitch. Read More


SLIDESHOWS

10 best Android smartphones of 2013

2013 was a big year for the Android smartphone ecosystem.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 best Android smartphones of 2013

2. Report on NSA 'secret' payments to RSA fuels encryption controversy

3. Inside knowledge likely in Target breach, experts say

4. 10 ex-Cisco employees making an impact in the industry

5. 'PGP' encryption has had stay-powering but does it meet today's enterprise demands?

6. Juniper vs. Palo Alto Networks: Firewall court battle set to begin

7. What's Microsoft going to look like after Ballmer?

8. Notable deaths of 2013 from the worlds of technology, science & inventions

9. Bah humbug. IT pros expect to work over holiday break

10. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: