Search This Blog

Thursday, March 04, 2010

Former NSA tech chief: I don't trust the cloud; Apple abolishes Wi-Fi scanners

Apple Abolishes Wi-Fi Scanners From App Store | Report: North Korea develops own Linux distribution

Network World Daily News PM Alert

Forward this to a Friend >>>


Former NSA tech chief: I don't trust the cloud
The former National Security Agency technical director told the RSA Conference he doesn't trust cloud services and bluntly admonished vendors for leaving software vulnerabilities unpatched sometimes for years. Read More


WHITE PAPER: Riverbed

WAN Optimization Can Multiply IT Efficiencies
Data center consolidation, regulatory compliance and a more distributed environment are some of the IT initiatives making a comprehensive and robust disaster recovery plan more important than ever before. The Enterprise Strategy Group highlights trends in DR, the role of virtualization and the impact of WAN optimization. Learn more.

E-GUIDE: HP ProCurve

Standards to Soothe Networking Headaches
Is you network comprised of multiple switching tiers running proprietary protocols capable of handling next-generation applications? This Network World eBook looks at open, virtual switching, unified fabrics and bandwidth of 10 Gigabit Ethernet and more. Get expert advice on how to turn your network into a more simplified, open infrastructure. Read Now.

Apple Abolishes Wi-Fi Scanners From App Store
iPhone apps that find Wi-Fi hotspots by actively scanning for them are no longer welcome in Apple's App Store, Softpedia reports. Read More

Report: North Korea develops own Linux distribution
North Korea has reportedly developed its own version of the Linux operating with a graphical user interface that closely resembles Microsoft Windows. Read More

10 Best iPhone Role Playing Games
Everything from action RPGs like Across Age to first-person Oblivion-esque titles like Ravensword. Read More


WHITE PAPER: IBM NWW

Develop Effective user Management
With IBM, organizations can develop comprehensive solutions to help gain visibility into business continuity risks, achieve control over utilization of sensitive business assets and automate a variety of processes for managing access to critical assets and data. Read more

FCC broadband czar defends national plan
Blair Levin, who is overseeing the creation of a national broadband Plan, told Computerworld that a final version will be submitted to Congress by March 17, right on schedule. Read More

Definition of 'broadband' still a secret in U.S. plan
The National Broadband Plan is due to reach Congress in two weeks, but there is still some mystery about how the plan will define the term "broadband." Read More

News podcast: Network World 360
Three University of Michigan computer scientists say they have found a way to exploit a weakness in RSA security technology used to protect everything from media players to smartphones and e-commerce servers. Also, a new survey from the Ponemon Institute says identity thieves are increasingly going after medical information data and services. (4:50) Read More


WEBCAST: HP

Improve Tracking of VM Devices
Virtualization has a major impact on the network and those who manage it, making it difficult to gain visibility to inter-VM traffic. This Webcast addresses the challenges – from operating expenses and compliance to security and management. Learn best practices to alleviate some of the burden virtualization has placed on the network. Listen now

Microsoft envisions ultra-modular data centers
In the years to come, Microsoft's data centers may not be huge buildings tightly packed with server racks, but rather rows of small, stand-alone IT units spread across acres and acres of cool, cheap land. Read More

Microsoft to spend $9.5 billion on research in 2010
Microsoft plans to spend $9.5 billion on research and development this year, which a senior executive said Thursday is more than any competitor. Read More

IBM aims to replace copper chip interconnects with light
IBM researchers are a step closer to developing chips that use pulses of light instead of electrical signals to carry information between them. Read More

Chinese attacks like the one against Google are on pace to double this year
Recent Internet attacks from China against Google and other U.S. companies will more than double this year if the pace during the first two months continues, a security expert says at RSA Conference. Read More

Security firms help shut down Mariposa botnet
The cybercriminals behind the Mariposa botnet, which attacked 13 million computers worldwide, stealing sensitive personal data such as social networking logins and credit card details, have been arrested, says Panda Security and Defence Intelligence. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. New exploit technique nullifies major Windows defense
  2. Ten of the world's strangest social networks
  3. The man behind Microsoft's Windows Phone design
  4. Is Novell worth $2 billion?
  5. Wi-Fi finders let thieves track down hidden laptops
  6. 21 apps Apple doesn't want on your 3.0 iPhone
  7. EMC: Flash could spell doom for Fibre Channel
  8. 7 most useful Firefox add-ons
  9. Microsoft: Don't press F1 key in Windows XP
  10. Novell target of hedge fund's $2 billion takeover bid

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: