Search This Blog

Monday, September 28, 2009

Xerox to buy ACS for $6.4 billion; tech celebrity lookalikes; UNC data breach exposes 163,000 SSNs

Separated at birth: Tech honchos and their famous lookalikes; Xerox to buy ACS for $6.4 billion
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Tidal Software
rule

Gartner: App Performance Monitoring
Will Cappelli of leading analyst firm Gartner talks about how applications have become central to enterprise IT operations, and how complex architectures have led to significant challenges in monitoring and managing the performance of applications.

Register now.

rule

Spotlight Story
AT&T accuses Google of violating telecom law

AT&T on Friday accused Google of violating the FCC's net neutrality rules by blocking Google Voice calls to some rural areas. Read full story

Related News:

Separated at birth: Tech honchos and their famous lookalikes
Tech titans are often one of a kind characters. But some Silicon Valley kingpins have virtual twins lurking in Hollywood and Washington, D.C. Who might play Marc Benioff or Carly Fiorina? Here's a look.

Xerox to buy ACS for $6.4 billion
Xerox has agreed to buy Affiliated Computer Services (ACS) for $6.4 billion, in a move it hopes will allow it to expand beyond the field of document management, it said Monday.

UNC data breach exposes 163,000 SSNs
The University of North Carolina at Chapel Hill began notifying about 163,000 women about the potential compromise of their Social Security numbers and other personal information after a hacker breached a system containing the data.

IRS scam now world's biggest e-mail virus problem
Criminals are waging a nasty online campaign right now, hoping that their victims' fears of the tax collecter will lead them to inadvertently install malicious software.

Adobe, McAfee to combine DRM and data-loss prevention
Adobe Systems and McAfee will jointly develop a product that combines digital rights management capabilities with technology designed to prevent data from leaking outside corporate networks, the companies said Monday.

To fight worms, use ants
To combat worms, Trojans and other malware, a team of security researchers wants to use ants.

Palm snags prominent Web technologists
Dion Almaer and Ben Galbraith, who have led the Mozilla developer lab, are now directors of the Palm Developer Relations team.

Ways that employees breach data (podcast)
David Ting from Imprivata discusses the ways employees can inadvertently, intentionally and ignorantly cause data breaches, and whether current IT security practices can stop them.

Cisco thanks NIST for its time on smart grid
Cisco "noted its appreciation" for the work the National Institute of Standards and Technology put into the development of the draft NIST Framework and Roadmap for Smart Grid Interoperability Standards. In a statement of its appreciation, however, Cisco did not come out and tacitly support or endorse the draft.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

aCelera/IBM Rational ClearCase Evaluation:Global Telecommunications Company
Read this evaluation on the implementation of aCelera technology supporting a Telco's IBM ClearCase deployment of approximately 10,000 seats. Learn how it will produce a productivity benefit ranging from $1.18 million USD to $18.0 million USD in year 1 of production.
Learn more.


Best Practices for Selecting WAN Optimization Solutions
This white paper explains how to best make this critical technology decision. It provides an overview of best practices for defining requirements and comparing alternative solutions. Most important, it offers a metric – performance ROI – that IT organizations can use to select the WAN optimization solution that delivers the greatest business value.
Learn More

 

September 28, 2009

MOST-READ STORIES

  1. Microsoft "Courier" Tablet to compete against Apple Tablet
  2. Microsoft, researchers release new operating system project
  3. IE8 runs 10 times faster with Google plug-in
  4. Microsoft blasts Google over Chrome Frame plug-in
  5. Chambers' pay package climbs 16% while Cisco net income falls 23%
  6. How could iPhone MMS crash AT&T's network?
  7. MMS to go live on the iPhone tomorrow
  8. What to do about bandwidth hogs?
  9. FBI building system that blows away fingerprinting
  10. Seven advanced car technologies the government wants now

The Dramatically Shifting Role of Network Management
The traditional approach to network management focused just on the availability of networks. While that is still important, today's network managers are also being held responsible for the performance of network and applications. Listen to a conversation between Jim Metzler and Stelio D'Alo that discusses the business, technology and management trends that are impacting your job.
View Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: