Search This Blog

Monday, October 01, 2007

Review of 802.11n wireless gear; Top 14 VoIP vulnerabilities; Networking Encyclopedia beta

Network World

Daily News: PM




Network World Daily News: PM, 10/01/07

REVIEW

SCREAMING MIMO
New 802.11n Draft 2 products targeted at the small-office/home-office market show a dramatic improvement in interoperability and a slight improvement in throughput over the Draft 1 products we tested last summer.

NETWORKING ENCYCLOPEDIA 2.0, BETA VERSION

Straight Talk from Security Experts

Leading security experts share their advice, secrets and real-world experiences in Network World's latest Executive Guide, "The Security Treadmill." Learn how to get inside users' heads, fight for a bigger security budget and much more.

Click here to download this Executive Guide.

We're completely gutting and rebuilding our Networking Encyclopedia - with your help. This time around, rather than us simply writing definitions, we've created a community system that lets any NetworkWorld.com visitor write and expand definitions. After all, who knows enterprise networking better than you? When you connect, you'll see a (currently rather barebones) table of contents. Users who register (it's free) can post new definitions - and revise existing ones. Anybody, regardless of account, can post comments on definitions. Eventually, we'll add other bells and whistles (a way to rate the quality of definitions, for example), but first, we want to get a good base of definitions in place. Let us know what you think.

IN COMMUNITY

New blogger: Kerrie Meyler, the lead author for Microsoft Operations Manager 2005 Unleashed, will be discussing Microsoft issues.

Brad Reese wonders if there's now a worldwide shortage of people with critical Cisco skills and considers the new Rent a Cert (Channelguy discusses Rent a Cert as well). Jeff Doyle explains IPv6 transition and operational reality. Wendell Odom explains how VTP clients can update servers. Huawei's impending co-purchase of 3Com: Good or bad?

Paul McNamara seems kind of disappointed that nothing blew up or caught on fire when Verizon installed FiOS in a relative's house - but then, the relative made a point of showing the tech where to drill. Ron Colonna discusses what's not so good about technical training. Craig Mathias asks if anybody has experience with the Fujitsu U810 tablet PC.

James Gaskin looks at Microsoft's decision to let vendors keep selling XP and concludes it's a good time for SMB buyers to look at Linux. Mark Gibbs ponders it as well, and decries endless upgrade mania.

John Obeto smells fear at Google and urges Microsoft to simplify its EULA. Tyson Kopczynski hates Microsoft's Genuine Office Validation. Chris Dalby is wowed by a video device called Round Table. Susan Hanley writes that software deployments take a village - with multiple points of failure.

Users debate whether IT folks get paid enough, whether security vendors should hire virus writers and whether booth babes are history at trade shows.

IN DEPTH

SECURE WEB GATEWAYS: SLAMMING THE DOOR ON MALWARE
The Web has become the new security battle front, surpassing even e-mail as the leading source of malware infections. In a recent study, Google found that one in 10 Web sites that it crawled contained a malicious payload. And Gartner Group estimates that 75% of enterprises will be infected this year with targeted malware that evades their traditional defenses. Why? While more than 80% of enterprises have some form of URL filtering in place, less than 15% have any form of deep inspection on Web payloads, resulting in a Web security gap.

MORE NEWS

TOP 14 VoIP VULNERABILITIES
How are VoIP networks weak and vulnerable to attack and catastrophic failure? Securing VoIP Networks, the new book by Peter Thermos and Ari Takanen, looks at VoIP infrastructure and analyzes its vulnerabilities much as the Open Web Application Security Project did for Web-related vulnerabilities and Mitre did with its Common Weakness Enumeration dictionary for software. And it’s about human failings, too, not just technology problems.

MORGAN STANLEY ABUSED CAREERBUILDER.COM PERSONAL INFORMATION TO MAKE SALES CALLS, STATE SAYS
Massachusetts is charging financial advisors from Morgan Stanley in Boston with improperly accessing CareerBuilder.com to download resumes and collect personal information of job seekers in an effort to solicit business on behalf of Morgan Stanley. 

COMPLIANCE PUSHING IDENTITY MANAGEMENT IN NEW DIRECTIONS
Shifting sands moving corporate priorities when it comes to finding the value in identity management projects.

ELEVATOR MAKER GETS A LIFT OUT OF VoIP
Elevator maker ThyssenKrupp is adopting ShoreTel VoIP gear to centralize telecom management, reduce maintenance costs and improve the capabilities of its call centers.

UNAUTHORIZED IPHONE APPS MARKET FLOURISHES
Despite Apple's position that iPhone applications be limited to ones that run through the Safari Web browser, Ajax developers say there are glitches in writing Safari-based apps and some are writing apps to be installed directly on the iPhone, contrary to Apple policy.

HP UNLEASHES WIRELESS NETWORK TRAFFIC MONITORING
HP claims to be the first to implement a technology designed to improve traffic monitoring in wireless networks.

TODAY'S MOST-READ STORIES:

1. 2007 Salary survey: IT pay falls short
2. Security issues stall max transmission rates
3. Verizon FiOS installation sparks nothing?
4. 'Radical rethinking' of Internet routing
5. 13 free tools ease IT management
6. Storm: the largest botnet in the world?
7. iPhone gets VoIP tryout
8. 3Com customers should 'stand pat'
9. NIST's 56 cool advanced research projects
10. New update breaks hacked iPhones

MOST E-MAILED STORY:
'Radical rethinking' of Internet routing


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: