Search This Blog

Thursday, May 21, 2009

Enterprise chief says Nortel customers hit 'pause button'

Angered by Apple delay, hacker posts Mac Java attack
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
While at the Dynamic Infrastructure Worldwide Virtual Forum, you will hear from leading experts on today's IT challenges. We'll demonstrate how your business can dramatically improve productivity through virtualization, energy efficiency and flexible sourcing. We'll also show you how to prepare your infrastructure to address your business needs and to take advantage of emerging capabilities and delivery models such as cloud computing. Register Now

rule

Spotlight Story

Enterprise chief says Nortel customers hit 'pause button'
By Jim Duffy
LAS VEGAS -- Nortel enterprise customers have pressed "a pause button" in purchasing gear from the company, the chief of Nortel's Enterprise Solutions group acknowledged this week. Read story

Related News:

Angered by Apple delay, hacker posts Mac Java attack
In an effort to draw attention to an long-standing security problem in Apple's Mac OS X operating system, a security researcher has posted attack code that exploits the flaw. 

Network usage climbs while IT budgets, staff remain down
LAS VEGAS -- The economy may be sluggish, but that hasn't decreased demand for network services, which could be why enterprise network managers at Interop Las Vegas say they plan to maintain current staff and expect to see budget dollars return in the coming months. 

Fibre channel over Ethernet a hot topic, so hurry up and wait
LAS VEGAS -- Fibre Channel over Ethernet is considered an initial step towards a converged data center switching fabric, and it was a hot topic at this week's Interop conference. The Ethernet Alliance hosted an FCoE and Converged Ethernet SAN interoperability demonstration; vendors highlighted products such as switches, adapters and testers that are designed to support FCoE; and conference keynotes, sessions and discussions seemingly all had an FCoE angle or element. 

iPhones in the enterprise leaving IT pros at wit's end
LAS VEGAS--Executives smitten with iPhones are forcing enterprise IT departments to come up with ways to support the mobile devices even though big security and management questions abound. 

Introducing the New Active Directory Domain Services in Windows Server 2008 R2
AD DS in Windows Server 2008 R2 includes eight important new features from a Recycle Bin to Managed Service Accounts. Microsoft Subnet guest blogger John Policelli offers a detailed overview of all eight.

Investigators replicate Nokia 1100 online banking hack
An old candy-bar style Nokia 1100 mobile phone has been used to break into someone's online bank account, affirming why criminals are willing to paying thousands of euros for the device. 

Broadcom chips target unified edge switch for wireless, wired clients
Broadcom this week announced new chips designed to create a low-cost 802.11n wireless LAN edge for the enterprise, without the need for separate WLAN controllers.

Conficker still infecting 50,000 PCs per day
The Conficker worm is still infecting systems at a brisk rate and continues to snag computers in Fortune 1000 companies, according to security researchers. 

NetApp's $1.5B purchase of Data Domain focuses on de-dupe, backup
NetApp has agreed to purchase Data Domain for $1.5 billion in a deal that will bolster the storage company's ability to de-duplicate data and provide backup for systems from rival vendors such as EMC and HP. 

FCC Tightens Grip On VoIP Rules
The Federal Communications Commission is ratcheting down the rules for VoIP carriers and providers once again, in the name of increasing end-user rights and protection. 

"Security Metrics" and risk-assessment guides out this week
For security professionals, two free risk-management guides out this week provide directions on how to establish corporate security metrics, as well as tips on organizing risk-assessment and presenting findings. 


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
While at the Dynamic Infrastructure Worldwide Virtual Forum, you will hear from leading experts on today's IT challenges. We'll demonstrate how your business can dramatically improve productivity through virtualization, energy efficiency and flexible sourcing. We'll also show you how to prepare your infrastructure to address your business needs and to take advantage of emerging capabilities and delivery models such as cloud computing. Register Now

rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now


Compare Network Management Products
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Network Management Product Guide.
Visit now

 

05/21/09

Today's most-read stories:

  1. Wanted for hire: generalists, not IT specialists
  2. Holographic meetings, gestures as mouse clicks
  3. Web attack that poisons Google results gets worse
  4. Enterprise chief says Nortel customers hit 'pause button'
  5. Where the IT jobs are: 10 American cities
  6. Inside the bad-ass world of military research projects
  7. IPhone security, part 2
  8. NDC: Cloud computing
  9. Cisco unveils a grab bag of wireless LAN products
  10. Expect more from WAN optimization than just optimization


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: