Search This Blog

Wednesday, August 04, 2010

Position-based quantum cryptography: A scientific breakthrough?

Extreme Networks taps CEO with loads of enterprise network experience | Game changers: 12 technologies that changed everything

Network World Daily News AM

Forward this to a Friend >>>


Position-based quantum cryptography: A scientific breakthrough?
Position-based quantum cryptography is a discovery that could lead to more secure communications, especially between devices used on military bases and satellites, based on using the geographical position of a party as its only credential, according to new research. Read More


ARTICLE: Extreme Networks

From Physical to Virtual to the Cloud
The migration from a dedicated infrastructure to a shared and outsourced cloud infrastructure is not a one-size-fits-all proposition. With Extreme Networks "Four Pillars" strategy, Enterprises and Hosting Centers of any scale can approach change in a logical and affordable, stepwise fashion. Read More

WHITE PAPER: Insight

How to Double Productivity of Your IT Staff
Examine how Oracle Database 11g helps IT provide more information with higher quality of service, making more efficient use of budgets and reducing the risk of change in data centers. Learn more!

Extreme Networks taps CEO with loads of enterprise network experience
Extreme Networks has named Oscar Rodriguez, a 20-year industry veteran, as its new president and CEO. Rodriguez replaces CFO and acting President and CEO Bob Corey, who will continue as CFO. Read More

Game changers: 12 technologies that changed everything
New technologies emerge all the time, but only a handful change everything that follows in their wake. And they're not always the first of their kind. Read More


WHITE PAPER: Insight

Examine Open Storage v. Proprietary Disk Systems
Download this whitepaper today and examine how Oracle's Sun Storage 7000 Unified Storage Systems offer a complete, open and integrated solution that: * Reduces time to deployment. * Lowers risk. * Simplifies storage deployment and management. Read now!

Firefox Falls Further Behind in Browser Wars
Linux user, how many different Internet browsers do you have on your system? You have Konqueror if you use KDE, Iceweasel or Epiphany if you use GNOME, and optionally, you might have Firefox, Chrome or Opera. You might have all of those. Read More

AVG uncovers new data-stealing Mumba botnet
Researchers at AVG have uncovered a botnet that has been harvesting personal information and uses the latest version of the Zeus code, underscoring the widespread use of the sophisticated malware. Read More


WHITE PAPER: Red Hat

Red Hat Enterprise Linux: Your Solaris Alternative
With the improved price, performance, and reliability of industry standard x86_64 servers, buying SPARC hardware has become less compelling. Red Hat® Enterprise Linux has emerged as the OS of choice with its open, industry-standard architecture. Read More Now

Take Advantage of Increased Time Spent Social Networking
A new Nielsen study titled "What Americans Do Online" shows that Americans spend a growing percentage of their time online visiting social networking sites. Businesses need to be aware of trends like this in order to focus marketing efforts where the target audience spends its time. Read More

Cisco goes green with Catalyst 3750-X
Buy less equipment, use less power: That's a proposition network managers can get behind, and it's what Cisco promises with the new power management features in its Catalyst 3750-X stackable access switch. Read More

CCNP Lab Series
This series examines some tradeoffs for selecting used lab gear for use when studying for the CCNP exams, which were revised in early 2010. Read More

FBI looks just plain silly in logo beef with Wikipedia
For the love of J. Edgar Hoover, don't FBI lawyers have anything better to do? Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Nine real iPad alternatives
  2. Apple's iOS devices meet many enterprise security needs
  3. New Linux kernel borrows Google packet speeding tech
  4. iPhone apps that could save your life
  5. Hacker snoops on GSM cell phones in demo
  6. Microsoft patches dangerous Windows flaw
  7. Microsoft says patch clients first, then servers
  8. WPA2 vulnerability found
  9. 7 IT career rules worth breaking
  10. Microsoft: VMware customers are 'Windows customers first'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: