Search This Blog

Friday, July 16, 2010

Droid X vs. the Droid: Key differences emerge

Pimp Your Laptop | Apple's antenna guru reportedly warned execs about iPhone 4 design

Network World Daily News AM

Forward this to a Friend >>>


Droid X vs. the Droid: Key differences emerge
Although Motorola's Droid X and Droid smartphones bear similar names, they are very different devices. It has become clear that the Droid X should really not be seen as a sequel to the original Droid but rather a different model of smartphone altogether. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Riverbed

Address Real-Time Application Performance
IDC interviewed customers using Riverbed Cascade solution. Their analysis includes hard dollar ROI and benefits of the following features: • Application-level view of networks and servers • Visibility into end-to-end application delivery dependencies • Network behavioral analysis • Metrics to track performance SLAs Read now!

Pimp Your Laptop
Skin it, stick it, etch it, paint it -- check out these ways to make your laptop PC look unique without breaking it (or your bank account). Read More

Apple's antenna guru reportedly warned execs about iPhone 4 design
Apple's lead antenna expert repeatedly warned that placing the iPhone 4 antenna outside the phone would lead to signal loss and dropped calls, according to a Bloomberg News report. Read More

Apple had better give iPhone 4 owners free cases, say crisis experts
Facing mounting public relations troubles over the iPhone 4, Apple must act swiftly to quell customer complaints about poor reception by giving away free cases, crisis communication experts say. Read More


WHITE PAPER: NetApp

Best Practices for Design, Architecture and Management
This document provides NetApp best practices for architecting, sizing, and deploying a VMware® VDI environment on NetApp® storage. Learn more.

Verizon's Droid X: 12 Apps to Get You Started
Ladies and gentlemen, the newest Droid has officially landed. Here are some apps to get you started. Read More

Researchers: Password crack could affect millions
A well-known cryptographic attack could be used by hackers to log into Web applications used by millions of users, according to two security experts who plan to discuss the issue at an upcoming security conference. Read More

Cloud security strategies: Where does IDS fit in?
Security practitioners diving into cloud computing must make older security tools like IDS work in this new world. In a CSO podcast last week, Stu Wilson, CTO of IDS provider Endace, sought to explain how this older technology is still relevant in enterprise cloud security strategies. Read More


WHITE PAPER: Qualys

Justifying IT Security
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. Read now!

Microsoft set to co-fund Windows Phone 7 software development
Company is willing provide developers with support, including possible co-funding, a tactic the company says isn't new. Read More

Standard proposed for measuring data center efficiency
A group of organizations led by The Green Grid has recommended a standard way for data centers to measure their Power Usage Effectiveness, aiming to bring consistency to the metric and make it easier for different facilities to compare their results. Read More

Amazon and IBM are the 'cloud champions,' report says
Amazon and IBM are the "cloud champions" but Microsoft, Google, Cisco, Red Hat and VMware and right behind them. Read More

Actually, Windows Phone 7 Could be Microsoft's 'Vista'
A taste of the old Apple-Microsoft rivalry came back this week when a Microsoft executive threw Windows Vista under the bus, just to bash the iPhone 4's antenna problems. Read More

Cisco tops in IPS: survey
Cisco is the "top dog" in a recent customer survey of the leading Intrusion Prevention System vendors conducted by Infonetics Research. The June survey queried IPS buyers at 105 US and Canadian companies with at least 100 employees. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Robocop ran DOS
  2. DARPA issues call for computer science devotees
  3. Apple to hold iPhone 4 press conference Friday
  4. IE8 and Chrome are killing Firefox
  5. The Robin Sage experiment: Fake profit fools security pros
  6. Newest attack on your credit card: ATM shims
  7. Windows XP SP2 and 7 other things Microsoft has killed this year
  8. Researchers find privacy flaws in Chatroulette
  9. Cisco Linksys among "millions" of hackable routers
  10. Bluetooth at heart of gas station credit-card scam

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: