Search This Blog

Monday, October 11, 2010

Oracle's acquisition of Passlogix is a logical move

Android Hack Enables 3G Skype Calls | The US offshore wind energy technology conundrum

Network World Security: Identity Management

Forward this to a Friend >>>


Oracle's acquisition of Passlogix is a logical move
It was just a month ago ("Acquisition season heats up") that I said, "We're not even out of the summer and the acquisitions have started. Could be a very lively fall!" That was an understatement. Read More


ARTICLE: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Alcatel - Lucent

Maximize Bandwidth and Deliver Superior Performance
100G is a leap forward in scaling metro, edge and core networks without performance degradation or the cost and complexity of unnecessary network re-engineering. Alcatel-Lucent is the only supplier to offer deployable 100G solutions in both the IP and optics domains. Read Now.

Android Hack Enables 3G Skype Calls
Just a few short days ago, the official Skype application finally graced the Android Market. But to much dismay, the communications app lacked the ability to make 3G calls on certain carriers within the US. Read More

The US offshore wind energy technology conundrum
US could see more then 4,000 GW of power from offshore windIf wind is ever to be a significant part of the energy equation in this country we'll need to take it offshore - into the deep oceans. Large offshore wind objects could harness about more than 4,000 GW of electricity according to a massive report on wind energy out this week from the Read More

Facebook's new groups feature worries some
This week's overhaul of Facebook groups quickly led to an outcry over the way the service works, but the bigger lesson may be simply this: Be careful who you befriend. Read More


WHITE PAPER: HP

Expert Guide to Latest Network Trends
The emergence of 10 Gigabit Ethernet, virtualization and unified switching fabrics is ushering in a major shift in data center network design: three-tier switching architectures are being collapsed into two-tier ones. Review this Network World eGuide to help you build a more reliable, stable and future-proof network. Read Now

Best practices for endpoint security, Part 2
To cyber thieves, endpoint devices are a tempting target. Such devices can be a treasure trove of sensitive information in their own right, but they are also the gateway to bigger targets like network servers, databases and applications. In this article, security experts Faycal Daira and Bob Foley offer even more of their best practices for endpoint protection. Last week we looked at antivirus, device control, and host-IPS and behavioral protections. This week we cover location awareness, network access control and application control. Read More

Physical security information management (PSIM): The basics
The concept that's become known as Physical Security Information Management (PSIM, pronounced P-sim) was introduced to the physical security world in 2006. The idea is that all the stuff of security is actually data. Data that, once contextualized and analyzed, becomes information for making better business decisions. It is applying the concepts of information management and business intelligence to the practices and technologies of physical and homeland security. Read More

Bill would protect towns, schools from cybertheft losses
U.S. Sen. Charles Schumer (D-N.Y.) has introduced a bill that would protect municipalities and school districts against financial losses resulting from certain types of cybertheft. Read More


WEBCAST: NeuStar, Inc.

10 Must-Do's for a Profitable Selling Season
The e-tailing group will ensure your team is ready to realize your maximum share of holiday dollars by highlighting best practices drawn from the e-tailing group Mystery Shopping and Mindset of a Multi-Channel studies. Learn More

McAfee introduces antivirus product for virtual environments
McAfee has introduced software to help companies moving to desktop virtualisation to remain secure Read More

Don't expect to peer into Google cloud services security
Customers of Google cloud services who are concerned about security better get used to being unable to check out first-hand how well their data is being protected, a Google spokesman told a high-tech leadership council recently. Read More

U.S. in rare earth quandry
In the face of China wielding menacing control over 97% of the world's rare earth materials, the U.S. House of Representatives recently passed a bill that would bolster R&D of the key elements and help find substitutions for the materials. Read More

Microsoft plans colossal Patch Tuesday next week
Microsoft will deliver a record 16 security updates next Tuesday to patch a whopping 49 vulnerabilities in Windows, Internet Explorer (IE), Office and SharePoint. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. Tech CEOs tell U.S. gov't how to cut $1 trillion from deficit
  2. Apple iOS 4.1 "Greenpois0n" jailbreaks tool set for 10/10/10
  3. Microsoft proposes each PC needs a health certificate or no net access
  4. Report: Microsoft, Adobe CEOs meet to discuss Apple
  5. Microsoft: 16 security patches coming Tuesday
  6. IBM makes the mainframe young again
  7. Top reason for Facebook unfriending: Too many useless posts
  8. Prepare for record onslaught of patches from Microsoft
  9. Sprint CEO mum on plans for Phone 7 devices
  10. Cisco's umi gets panned

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: