Search This Blog

Friday, April 16, 2010

New malware can take control of Macs; Why not iSCSI?

Why not iSCSI? | H-1B case reads like Sopranos episode

Network World Daily News PM

Forward this to a Friend >>>


New malware can take control of Macs
Batten down the hatches! Better yet, unplug your Mac and run for the hills! Intego, purveyor of internet security and privacy software for the Mac, reports that a new variant of malware -- the intimidatingly named HellRTS -- has been spotted in the vast untamed reaches of the Internet. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

Why not iSCSI?
Even though FibreChannel over Ethernet gets all the hype, iSCSI over Ethernet is just as capable of converging or unifying data center servers, storage and networking, proponents say. Read More

H-1B case reads like Sopranos episode
A federal case filed in New Jersey this month alleges that an H-1B visa-holding IT employee who was owed some $53,000 in back wages was threatened in meetings at restaurants and in his home if he didn't change his story. In an effort to turn the tables, the victim captured some of what happened on tape. Read More

MIT researchers boost efficiency of wireless power
MIT researchers working on wireless power have discovered a way to make it more efficient: Charge up lots of electronic gear at the same time. Read More


WHITE PAPER: MainSoft

Drive SharePoint Adoption in Lotus Notes Shops
The paper details best practices for measuring the impact that email integration with SharePoint has on user adoption, and reviews IT options for Lotus Notes shops that want to integrate email with SharePoint - including a migration to Outlook and Exchange and a Notes-SharePoint coexistence strategy. Learn More

Apple moves up the Fortune 500 list
The financial press continues to provide Apple with rosy news. In Fortune magazine's eponymous list of top 500 companies for 2010, Apple jumped to number 56 from 71 last year. And Bloomberg BusinessWeek, in its own annual report, places Apple at the top of its list of "The 50 Most Innovative Companies." Read More

New cyber crime intelligence service launched
A new service to identify enterprise vulnerabilities to cyber-crime attacks is being launched by RSA, the security division of EMC. The new RSA CyberCrime Intelligence Service, offered as a managed service, is designed to help organisations identify computers, information assets and identities compromised by Trojans and other online attacks. It will also help remediate them through security policy and control. Read More

Oracle buying drug trials software maker for $685 million
Oracle announced plans to buy Phase Forward, which develops software for drug manufacturers, for about $685 million. The deal is expected to close mid-year. Read More


WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Products of the Week
Our round-up of intriguing new products from Enterasys, EMC, Dataguise, among others. Read More

iPhone is app development king
The iPhone operating system has come out on top of a new survey of application developers conducted by Ovum Research. Read More

Microsoft sponsors gaming competition for a good cause
Many video games feature competition among Mafia hit men, post-apocalyptic armies, or cops and robbers. But how about a battle between medicines and disease? Four students at Tufts University near Boston have created the game "Nanobots," and are among 10 finalists in the U.S. Imagine Cup 2010 competition sponsored by Microsoft. Read More

Windows Phone 7 vs. iPhone matchup: a developer's perspective
Enterprise developer and author Kevin Hoffman straddles two mobile worlds: Windows Phone 7 and the iPhone. He shares early impressions of his Windows Phone experience and how it stacks up against the iPhone OS. Read More

Cloud computing: Early adopters share five key lessons
While some large enterprises have moved their IT infrastructure to a third-party managed service to save costs, small firms -- especially startups -- have come to rely on cloud services to cut initial outlays and help them focus on the core services and products. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. 5 hot IT certification picks for 2010
  2. Zombies are open source; humans are proprietary
  3. Apache project server hacked, passwords compromised
  4. Israel bans iPads from America
  5. Windows Phone 7 vs. iPhone: a developer's perspective
  6. Why not iSCSI?
  7. Why hasn't Linux been more successful on the desktop?
  8. 10 things the Internet has ruined and five things it hasn't
  9. 12 "White Hat" hackers you should know
  10. Mystery solved: Why time stands still at 9:42 on iPhone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: