Search This Blog

Thursday, February 12, 2009

WAN critical to virtualization's payoff; Hacker challenge takes aim at browsers, smartphones

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Enterprise DB
rule

Ensuring Web 2.0 App Success.
Meet the challenges presented by Web 2.0 applications head on by taking a fresh look at the tasks handled by your JEE application server. Find out how in this whitepaper. Discover how you can improve database performance and better deliver resources to the app's computational and UI operations.

rule

Spotlight Story
WAN critical to virtualization's payoff

Jim Duffy By Jim Duffy
Guaranteeing application performance over a WAN is hard enough. Now try doing it in a virtual environment. Read full story

Related News:

News podcast: Network World 360
Microsoft Tuesday released a critical patch designed to thwart hackers who could take over Exchange Servers or shut them down with denial-of-service attacks. Also, Nortel recently revealed plans to cancel its annual shareholders meeting, requested an extension to its bankruptcy protection, and indicated that more layoffs are on the way, in addition to other cost-cutting measures. (6:10)

Products of the week
Cool new announcements from Sun, NetScout and CA and others.

Hacker challenge takes aim at browsers, smartphones
The hacking contest that has grabbed headlines two years running will take aim next month at browsers and smartphones, according to the security company that sponsors the "PWN2OWN" challenge.

Force10 unveils virtualization framework
Force10 Networks this week unveiled a blueprint for easing the management of virtualized data centers.

Microsoft: Windows 7 no 'magic bullet' for enterprises
Microsoft warned enterprise customers this week that the migration path from XP to Windows 7 won't be any easier than it is to Vista, and offered recommendations for how companies can move from older versions of Windows ...

Obama inauguration guarded by high-def video system
The presidential inauguration event last month was guarded with an advanced video-surveillance system used by local and federal law enforcement to watch over both President Obama and the burgeoning crowds out to observe ...

Will Google's PowerMeter Be Home Automation's Savior?
Google's PowerMeter, which will enable consumers to see how much energy they're using, is one of the best home automation ideas to come along in a long time. Although still being put through its paces by Google ...

XP to Windows 7 upgrade strategy explained, defended
Microsoft Subnet blogger says enough with the conspiracy theories … upgrading from XP to Windows 7 isn't the end of the world.

SQL Server 2008 - happy half-birthday
The database celebrated its birthday by crashing the eval copy of blogger Brian Egler … but, in his humorous way, he's got a plan to restore it.

Last call: Anheuser-Busch IT guy tossed into prison for computer theft
An ex-IT consultant for Anheuser-Busch this week got 18 months in prison and was ordered to pay $377,000 in restitution for swiping nearly $400,000 worth of the beer giant's computer gear.

Today on Microsoft Subnet
SQL Server 2008 - Happy half-birthday - The database marked its birthday by timing out blogger Brian Egler's eval copy … but he's got a plan to restore it; Windows Remote Management: we are under your command (line); Moonlight 1.0 available to bring Silverlight to Linux … does anybody care?

Today on Cisco Subnet
Rumor mill: Cisco said to be gearing up to buy VMware, we'll believe it when we see it; Did Borat help Cisco bring its Mobile WiMAX technology to make benefit for glorious nation of Kazakhstan?; Blogger Larry Chaffin notes that Intel's $7 billion was made in the USA.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Enterprise DB
rule

Ensuring Web 2.0 App Success.
Meet the challenges presented by Web 2.0 applications head on by taking a fresh look at the tasks handled by your JEE application server. Find out how in this whitepaper. Discover how you can improve database performance and better deliver resources to the app's computational and UI operations.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/12/09

Today's most-read stories:

  1. Largest coordinated ATM rip-off ever nets $9+ million
  2. Shareholders say Microsoft squanders billions on R&D projects
  3. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  4. Google's Latitude: Not new, but worrisome
  5. FAA network hacked
  6. A few clean words from the creator of Cursebird
  7. Nortel to shed shareholders meeting, more employees
  8. Kaspersky says Web hack 'should not have happened'
  9. Google adds ActiveSync to accommodate iPhone, Win Mobile
  10. IBM, Juniper join in cloud strategy


Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: