Daily News: AM
Network World Daily News: AM, 08/02/07 Massachusetts adopts Open XML The Commonwealth of Massachusetts Wednesday added Open XML to its list of approved open document formats. Wireless LAN best practices A study of corporate wireless LAN deployments reveals that the most successful ones are based on a set of practices that can dramatically improve employee flexibility and collaboration. Chat transcript available Did you miss yesterday's live chat with routing expert Jeff Doyle? Check out the transcript today. Get Up to Speed on the Latest in WLANs Easily stay on top of the latest developments and issues in WLAN technology, standards, security, telephony, management and more with Network World's latest Executive Guide, "Keeping Up With the Wireless Whirlwind." Click here to download! | | Compliance policies outdated and ignored at large financial institutions Compliance policies at large financial institutions are outdated and often ignored by employees, a new survey has found. Researchers: Web apps over Wi-Fi puts data at risk Users who access Google's Gmail or the Facebook social-networking site over Wi-Fi could put their accounts at risk of being hijacked, according to research from Errata Security, a computer security company. Hosted software manages environmental compliance A software-as-a-service tool that manages environmental, health and safety compliance and is used by DuPont, Chevron and Johnson & Johnson has been upgraded with new features making it easier to plan for contingencies and keep tabs on compliance efforts. San Francisco Web host explains cause of power failure A Web hosting company Wednesday cited a faulty controller as the reason its backup electrical system failed during a San Francisco power outage last week, dousing the Web sites of several customers. Big Blue turning its data centers green IBM Wednesday said it will consolidate nearly 4,000 PC servers onto mainframes running Linux in a move that will cut $250 million from the cost of operating its six major data centers. Podcast Tackling configuration complexity with automation Industry watchers will tell you that human error and unauthorized change more times than not are the culprits behind unplanned network downtime and poor application performance. To prevent such configuration errors from wreaking havoc on networks and applications, vendors such mValent, equip software with automation technology. The automation, mValent says, reduces error, speeds time-consuming tasks and ensures improved application uptime. Listen to mValent founder and chief strategy office Swapnil Shah discuss with Network World Senior Editor Denise Dubie how his company works to help IT infrastructure teams support mission-critical applications. (23:02) Blogs Buzzblog: Feds target gaming pirates in 16 states Customs agents swooped down on 30 businesses yesterday, only the latest in a string of tech-related antipiracy measures stretching from here to China. From Microsoft Subnet: Are Software Assurance numbers real? 56 Microsoft products to be released in ’08. Seven ways to measure collaboration projects. Dancing Steve Ballmer. Today at Cisco Subnet We have a new guest blogger and a new book competition for August. Say hey to Jamey Heary, author of the soon-to-be-published "Cisco NAC Appliance: Enforcing Host Security with Clean Access." Jamey is blogging for us this month. Enter to win a copy of the book here. Read a free chapter here. Also: Cisco updates its CCDP certification program. Today on Layer 8, where life would indeed be a lot easier if we didn't have so many PINs and passwords: Face recognition as a unique biometric is growing slowly in certain corporate and consumer applications, but researchers at the University of Houston (UH) are trying to make the technology far more ubiquitous and secure: they want it to replace the dozens of personal identification numbers (PIN), passwords and credit card numbers everyone uses every day. University researchers developed the URxD face recognition software that uses a three-dimensional snapshot of a person’s face to create a unique biometric identifier. |
No comments:
Post a Comment