Search This Blog

Friday, July 16, 2010

Apple to give iPhone 4 users free cases

Strangest Sights in Google Earth, Part II | Poll: Many enterprises still on out-of-service XP SP2

Network World Daily News PM

Forward this to a Friend >>>


Apple to give iPhone 4 users free cases
Apple will give iPhone 4 users a free case for their smartphones to help them with antenna and reception problems, even though those issues have been reported by just a fraction of the phone's users, CEO Steve Jobs said Friday during a press conference the company called at its headquarters to discuss ongoing issues with the smartphone. Read More


WHITE PAPER: NetApp

Discovering Improved Data Protection Strategies
This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context. It outlines the factors you should consider as you evaluate and implement data protection solutions in your virtual environment. Learn more.

DOWNLOAD: Brocade

802.11n and Higher Education WLAN Opportunities
The introduction of 802.11n provides a holistic opportunity for universities to upgrade the network edge. Discover how higher education institutions can: * Maximize the value of their wireless networks. * Significantly reduce CapEx and OpEx. * Remain confident in their wireless LAN performance, security and reliability Read more!

Strangest Sights in Google Earth, Part II
Mapping software Google Earth turns the planet into a massive scavenger hunt for weird, wacky, and the unexplained. Here are a few of the things that keep us scratching our heads. Read More

Poll: Many enterprises still on out-of-service XP SP2
A surprising percentage of organizations are still running desktops with the XP Service Pack 2 OS, which Microsoft said it would no longer patch as of Tuesday this week. Read More

Mozilla increases bounty for security bug info to $3,000
Mozilla, the organization behind the Firefox Web browser, has upped the amount it will pay security researchers for information on security bugs in its products from US$500 to $3,000. Read More


WHITE PAPER: IBM

Fighting the Tide
Aberdeen Group recently examined how companies are using Business Intelligence (BI) tools to adapt to today's market pressures. This report focuses on IBM Cognos 8 BI users and compares the results they are seeing to other survey respondents. Read More

News podcast: Network World 360
A new report says Amazon and IBM are the "Cloud champions", but Microsoft, Google, Cisco, Red Hat and VMware are also among the list of heavyweights in the emerging cloud computing field. Also, beginning this fall, more than 80 community colleges and universities in the U.S. will begin training health care IT workers under a government grant program created to help fill an estimated 50,000 jobs needed to assist doctors and hospitals as they roll out electronic medical records. (4:35) Read More

Droid X Sells Out Despite Verizon Preparation
The Motorola Droid X is sold out online and in certain parts of the country at retail Verizon and Best Buy stores, despite Verizon Wireless' insistence on Wednesday that it would have plenty of the phones in stock. You will now have to wait until July 23 if you want a Droid X if you didn't get one Thursday. That's when Verizon Wireless says it will replenish depleted supplies. Read More

Most popular stories this week: July 16
An examination of tech gobbledygook in movies tops our list this week, though readers came to our site for more meaty fare, including a collection of free enterprise collaboration tools and a peek at some of the best features planned for Windows 8. Check out the list. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

White House meeting aimed to assert cybersecurity leadership
The White House meeting on cybersecurity issues held on Wednesday appears to have been as much about assessing progress on the Presidents cybersecurity agenda as it was on showing executive office leadership on the issue. Read More

EFF Fights To Allow People To Comment Anonymously Online
Should people be allowed to comment anonymously online? That question is currently making its way through the US legal system. A New York couple has issued dragnet subpoenas to Google and Yahoo demanding the identities of users behind 10 email accounts, 30 blog operators, website administrators, and the identities of anyone who had ever commented on those sites. That's hundreds of people! Read More

The spy who loved Windows
Headline writers the world over received an early Christmas present from Russia this summer with the spy scandal inviting them to use Bond film titles like "From Russia With Love" and "The Spy Who Loved Me" to tell the story. I couldn't resist either. Read More

Open Source hardware advocates want a hard-core license
Within one day of the release of a definition for "open source" hardware, the document has garnered endorsements from 50 people, many of them affiliated with manufacturing businesses. The document is only in its 0.3 draft version, so it's likely to change before being finalized. Read More

Carnegie Mellon: Hey kids, if you like robots, you'll really like computer science!
Carnegie Mellon University is launching a four-year, $7 million effort to encourage middle and high school students with an interest in robotics to major in computer science and pursue careers in the field. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Robocop ran DOS
  2. DARPA issues call for computer science devotees
  3. Apple to hold iPhone 4 press conference Friday
  4. IE8 and Chrome are killing Firefox
  5. The Robin Sage experiment: Fake profit fools security pros
  6. Newest attack on your credit card: ATM shims
  7. Windows XP SP2 and 7 other things Microsoft has killed this year
  8. Researchers find privacy flaws in Chatroulette
  9. Cisco Linksys among "millions" of hackable routers
  10. Bluetooth at heart of gas station credit-card scam

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: