Friday, February 13, 2009

Valentine's Day for geeks; Down economy fuels IT outsourcing

Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Qualys
rule

Four Steps to Security Compliance.
Cost-effective software as a service (SaaS) is a unified approach for IT, audit and operation teams to ensure their company is complying with federal regulations and internal security policies. Discover the four keys to IT security compliance, which are: Defining, discovering, evaluating and remediating. Get all of the details today. Download this whitepaper now.

rule

Spotlight Story

Geek Love for a Techie Valentine's
It's that time of year again to fret over what to do for that special geek someone, or, if you are that geek someone, what to do about getting your act together for Valentine's Day. Here are a few choice items that will help out the geek-inspired or the geek-impaired.
10 Ways to Know Your Geek Is Just Not That Into You
(Mostly) Offline Valentine's Day Activities for Geeks
Skout turns your iPhone into a dating machine
Survey says games make a great date
Top Techie Valentines
Top iPhone Valentines
10 best places to take a techie on a date
Online dating: The technology behind the attraction

Related News:

News podcast: Network World 360
The spreading Conficker/Downadup worm is now viewed as such a significant threat that it's inspired the formation of a posse to stop it, with Microsoft leading the charge by offering a $250,000 reward to bring the Conficker malware bad guys to justice. Also, the Yankee Group has written an open letter to President Barack Obama providing him with suggestions for deploying broadband Internet across the United States. (6:24)

Phones and cameras lead February's gadgets
As 2009 starts to pick up pace, the attention of the big gadget makers moves from January's International Consumer Electronics Show to February's Mobile World Congress in Barcelona. Lots of new phones will be launched at the event and the market for handsets with full touch-screens that was ignited by Apple's iPhone is of particular interest to phone makers. Take a look in this slideshow.

Down economy fuels IT outsourcing
Companies flocked to IT outsourcing vendors as the recession unfolded last year and industry watchers expect more of the same as companies seek to slash fixed costs and deliver services with smaller staffs.

Cloud computing obstacles, opportunities outlined by Berkeley researchers
UC Berkeley researchers have outlined their view of cloud computing, which they say has great opportunity to exploit unprecedented IT resources if vendors can overcome a litany of obstacles.

Satellites and Space Junk
Mathias: All these bits of hardware orbiting the earth, big and small, represent a serious threat to satellites in particular and space travel in general in the future. A chip of paint moving 25,000 KM/h can destroy a spacecraft quite easily. I suggest we start thinking about how to build a space-debris collection system (SDCS; I just made that up), as this problem will only get worse over time. Plus:
Space debris cleanup: We need Homer!

Researchers tout data buffering, quantum computing style
Researchers today are touting what they call a quantum buffer, technology that could be used to control the data flow inside a quantum computer.

Microsoft Exchange 14 Webmail to get Gmail-like threads
Exchange 14, the next version of Microsoft Corp. 's market-leading corporate e-mail server software, will add support for Google Inc. 's Gmail-like conversation view, full support for the Firefox and Safari Web ...

Microsoft plans stores, hires Dreamworks exec
Microsoft plans to open its own retail stores to "transform the PC and Microsoft buying experience," the company said Wednesday as it hired an executive to run the retail operation.

Wells Fargo CTO talks keeping costs flat
Scott Dillon, chief technology officer of Wells Fargo's Enterprise Hosting Services, the company's data center operation support group, spoke with Computerworld about his IT group's approach to keeping costs flat while ...


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Qualys
rule

Four Steps to Security Compliance.
Cost-effective software as a service (SaaS) is a unified approach for IT, audit and operation teams to ensure their company is complying with federal regulations and internal security policies. Discover the four keys to IT security compliance, which are: Defining, discovering, evaluating and remediating. Get all of the details today. Download this whitepaper now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.

 

02/13/09

Today's most-read stories:

  1. Microsoft announces $250,000 Conflicker worm bounty
  2. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. Largest coordinated ATM rip-off ever nets $9+ million
  5. Iridium calls may suffer outages from satellite crash
  6. Microsoft renames, expands free online services for higher-ed
  7. New amplifier paves way for 10Gbps wireless Web
  8. NSA identifies top 25 programming errors
  9. Rumor mill: Cisco to buy VMware?
  10. Did Borat help Cisco?


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment