Wednesday, September 22, 2010

Can behavioral biometrics help detect terrorists entering the U.S.?

Ohio will not budge on outsourcing ban | How to consolidate IT management tools

Network World Daily News PM

Forward this to a Friend >>>


Can behavioral biometrics help detect terrorists entering the U.S.?
Fingerprinting air passengers entering the United States is one counter-terrorism method used today . But the Department of Homeland Security (DHS) has another idea in the works: a behavioral biometrics monitoring system that gauges small changes in a person's body, dubbed the "fidget factor," especially in answer to a question such as "Do you intend to cause harm to America?" Read More


RESOURCE COMPLIMENTS OF: Aerohive

Free Wi-Fi Planning Tool from Aerohive.
With Aerohive's FREE web-based planning tool, you can plan a Wi-Fi deployment in no time! Upload your floor plan, draw the perimeter and walls using different wall types, and place any of a variety of different Aerohive APs either yourself or with our new auto placement feature to ensure the coverage level you specify. Click to continue

WEBCAST: Infoblox

Learn 4 Concepts to Network Automation
Join this webinar to learn where to start introducing network automation into your organization so you can: • Address Hidden IT Costs • Support Key Initiatives • Achieve Operational Optimization • Apply IT Resources More Strategically View Now!

Ohio will not budge on outsourcing ban
Ohio's governor Ted Strickland has defended his order to ban offshoring of state government work, describing it as "common sense". Read More

How to consolidate IT management tools
Years of acquiring specialized IT management tools have left some enterprises with too many network and systems management tools and too much overlap. It's time to clean house. Read More


DOWNLOAD: BlackBerry

Improve Enterprise BlackBerry Control & Security
Download your free copy of BlackBerry Enterprise Server Express and achieve improved end-user productivity,advanced IT control and support, proven security and manageability. Download Today!

Wireless networks, apps gaining ground in unlikely places
Mobile and wireless applications are already profoundly affecting underdeveloped areas of the world, according to a "Future of Mobile" panel at the EmTech@MIT 2010 conference today.. Read More

Join Network World's group on LinkedIn
Why join Network World's LinkedIn group? You can have interesting discussions with your peers, managed by Network World editors. You can make new contacts in your industry. It looks good on your profile. And of course, it's free. Join today. Read More


WEBCAST: Emerson Network Power

Hands-on DC management shouldn't give you paper cuts
This webcast demonstrates how field-proven Avocent MergePoint® Infrastructure Explorer software is already providing substantial ROI for data centers up to 500 racks. Its dynamic, graphic interface gives a deep view of your data center to help you more efficiently plan changes, lower operating costs, and deliver on-target capacity planning. Watch Now.

Kaviza adds iPhone, iPad, Android to virtual desktop package
Users of iPhones, iPads or Android-based smartphones can access virtualized Windows desktops using version 3.1 of Kaviza's VDI-in-a-box product, the company said on Wednesday. Read More

Aryaka cloud-based WAN optimization debuts
Aryaka came out of stealth today with a cloud-based application acceleration and WAN optimization service that build on the founders' experiment with content delivery networks. Read More

Air Force teams to build radiation-proof outer space system chips
The Air Force today said it has teamed with logic vendor Xilinx to build a high-density chip that promises to reduce costs, improve satellite circuitry and withstand the major impact outer space radiation. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Oracle's "new" kernel for RHEL clone: The real truth
  2. 5 strange ways iPhones die: Insurer hears it all
  3. Was Stuxnet built to attack Iran's nuclear program?
  4. Twitter 'antibodies' help kill worm, says researcher
  5. How to hack IP voice and video in real-time
  6. Why I switched to Android: 7 BlackBerry geeks speak
  7. Fly on the wall says Apple made Newsday kill funny iPad ap ad
  8. Is Stuxnet the 'best' malware ever?
  9. Be wary of PCoIP
  10. Android handset makers are like kids peeing in their pants

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment