Search This Blog

Monday, April 13, 2009

Rise of the netbook; Virtualization management: Cross-platform tools fall short

Can the status quo threaten your LAN? Entrust to be acquired; 6 Ways to Ruin Your Resume
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Avaya
rule

Masters of Unified Communications
This interactive microsite is updated daily by Johna Till Johnson of Nemertes Research with all of the latest news on Unified Communications. Explore this site now to read the latest news on UC and download relevant whitepapers, case studies, videos, and more.

rule

Spotlight Story

Rise of the netbook
To critics, netbooks are crippled notebooks. To fans, they're a new way of computing. You can expect big advances by year-end.
Read about how netbooks can be used in business environments or view a slideshow depicting the rise of the netbook

Related News:

News podcast: Network World 360
EMC's RSA division today announced an upgraded version of its data-leak prevention suite, adding more than 20 policy templates for recognizing personal identifiable information in countries around the world, including Spain and New Zealand. Also, Entrust today announced it has entered into a deal to be acquired by private equity investment firm Thoma Bravo for $114 million. (5:22)

Follow Network World on Twitter, from the people who bring you this newsletter.

Virtualization management: Cross-platform tools fall short
With the abundance of formidable virtualization platforms on the market today, there ought to be a better way to manage heterogeneous VM farms. Related:
CA offers the strongest current option for cross-platform virtual management
DynamicOps homes in on VM provisioning
TotalView provides static view of VMware- and Xen-based virtual servers
Microsoft's SC-VMM provides limited view of VMware-based VMs

Can the status quo threaten your LAN?
In times of economic crisis people tend to seek the safety and security of the status quo. "Doing what you've always done, and what everyone else is doing, is the most prudent course," goes the thinking.

Entrust to be acquired by private equity firm for $114 million
Entrust has entered into a deal to be acquired by private equity investment firm Thoma Bravo for $114 million.

TippingPoint offers customer filtering service
TippingPoint will announce at next week's RSA Conference a service that creates filters for its intrusion prevention gear to block potential attacks against vulnerabilities in corporations' custom Web applications.

Sallie Mae will undo IT offshoring, return jobs to U.S.
Student loan provider Sallie Mae Inc. last week announced that it will return its offshore operations to the U.S., along with about 2,000 IT, call center and operations support jobs.

Start-up led by Sun veterans unveils Intel-based data access appliances
Schooner Information Technology emerged from stealth mode with high-powered data access appliances designed to speed up Web 2.0 and cloud computing applications.

6 Ways to Ruin Your Resume
My vision is blurry. I've reviewed more than 40 resumes for a network administrator position, and less than half have made the cut. Although I rejected some candidates because of their lack of experience (or, rather, their lack of demonstrated required experience), others had errors in their application packages that lowered their ranking -- errors that could have been easily corrected.

Trend Micro dishes out security smorgasbord
Trend Micro Monday dished out a smorgasbord of endpoint security products that put the focus on Trend's cloud-based architecture and its partnership with systems-management vendor BigFix.

Twitter Worm Attack Continues: Here's How to Keep Safe
The malicious worm affecting Twitter over the weekend has now mutated and continues to invade the popular micro-blogging network. Although Twitter is taking action against the problem, security analysts fear that further mutations of the worm will continue to wreak havoc on the network over the week.

Identity management is key to the proper operation of cloud computing
One of the hot buttons, or buzz phrases, these days is "cloud computing." Boiled down, it's just like client-server computing except: a) you don't own the server; b) you don't know where the server really is; and c) you may not even know where your data resides. All that aside, there remains the issues of authentication and authorization; provisioning; entitlement management; governance; compliance; risk management; single sign-on; and all of the other facets of identity management. Is anybody even thinking about those?

Can Cisco commit to management software?
Cisco's recent Unified Computing System launch caused an analytical frenzy among industry watchers speculating about how the network equipment maker could rival HP and IBM in the data center server market.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Avaya
rule

Masters of Unified Communications
This interactive microsite is updated daily by Johna Till Johnson of Nemertes Research with all of the latest news on Unified Communications. Explore this site now to read the latest news on UC and download relevant whitepapers, case studies, videos, and more.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/13/09

Today's most-read stories:

  1. Conficker awakens, starts scamming
  2. Microsoft eating up U.S. and global netbook markets
  3. Bill would give Obama power to shut down Internet
  4. Are you an IT geezer? (and we mean that in a good way)
  5. A Twitter virus shows up: StalkDaily
  6. The 10 worst Microsoft product names of all time
  7. Netbook computers spark corporate interest
  8. Conficker, the Internet's No.1 threat, gets an update
  9. The implications of Skype's free software application for iPhone
  10. Fear and loathing in Windows 7: Testing Branch Cache using Linux
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Responsible for building a resilient data center

Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free: Visit http://www.nww.com/rpgx.jsp?c=XU1PHAZ4303.

IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: