Search This Blog

Tuesday, December 07, 2010

WikiLeaks' Assange arrested in London; VMware to virtualize Android smartphones

VMware to virtualize Android smartphones for business users | Smartphones or laptops for mobile workers?

Network World Daily News AM

Forward this to a Friend >>>


WikiLeaks' Assange arrested in London
WikiLeaks' chief spokesman Julian Assange was arrested on Tuesday by U.K. police after turning himself in to authorities, the Metropolitan Police said in a statement. Read More


WEBCAST: Riverbed

Faster Recovery for Windows Applications and Data
Are your backup & recovery plans up to snuff? Will you be able to restore critical systems & data quickly in the event of an outage? Learn valuable information on how to protect Windows applications & data in a distributed environment. Learn about challenges in protecting & restoring Exchange, SQL, & Windows file server, & more. Learn more!

WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

VMware to virtualize Android smartphones for business users
VMware is teaming up with LG to sell Android smartphones that are virtualized, allowing a single phone to run two operating systems, one for business use and one for personal use. Read More

Smartphones or laptops for mobile workers?
Smartphones are essentially computers, capable of accessing the core corporate resources mobile workers need on the go, but laptops are still best for heavy lifting. So which platform is best for mobile workers? Tom Henderson says the limitations of smartphones are too great, while Pejman Roshan says you don't need anything more. Read what they have to say and join the debate. Read More

iPhone customers dump on AT&T in Consumer Reports survey
Apple iPhone users made their displeasure known with AT&T in the latest Consumer Reports wireless carrier satisfaction survey, resulting in a last place finish for the carrier. Read More


WHITE PAPER: Sybase

Mobility Management for Dummies
In this informative Dummies Guide, you'll learn why mobility management and security is vital to your business. Plus, we'll introduce some of the best solutions and why you need to be prepared for the future—today! Read Now

WikiLeaks furor spawns rival DDOS battles
An anonymous, loosely affiliated group that has been responsible for a series of recent distributed denial of service (DDoS) attacks against entertainment industry Web sites over copyright issues, has started attacking organizations viewed as being hostile to WikiLeaks, says a PandaLabs researcher. Read More

Best and worst celebrity technology moments of 2010
Lindsay Lohan, Lady Gaga and Stephen Colbert collide with Twitter, iPads and hackers. Read More

Google engineer demos prototype Motorola Android tablet
Google's chief Android engineer on Monday showed a glimpse of a forthcoming tablet from Motorola, a potential competitor to Apple's iPad with a more powerful processor. Read More


WHITE PAPER: Hitachi

The Greener and Sustainable Data Center
There are many shades of green when it comes to sustainability. What does sustainability mean for business and particularly for IT? This paper focuses on how to improve on data center efficiencies and deploy greater sustainability across the IT infrastructure to achieve a greener data center. Read Now

White House points to Sputnik to save tech
President Barack Obama is calling for more investment in science and technology, and said the "Sputnik moment is back" for the U.S., referring to the 1957 orbiting Soviet satellite now synonymous with any foreign challenge to America's technical dominance. Read More

Unwrapping Google's Android "Gingerbread" gift
Android fans got an early Christmas gift from Google Monday as the company released the new "Gingerbread" version of its Android mobile operating system. Read More

Retailer accused of inflating Google ranking is arrested
An online retailer who boasted that complaints about his business helped boost its standing in Google search results was arrested Monday. Read More

Regulatory compliance hogs security pros' attention
One out of every two IT security professionals spends 50% of the work week on regulatory compliance initiatives, according to a new survey sponsored by eEye Digital Security. Read More

Hackers promoted bogus terror attack at APEC 2009
More information has come to light about the hacking attacks against Singapore Government and APEC officials at last year's Lion City meetings of the Asia Pacific Economic Cooperation Forum (APEC). Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Facebook rolls out redesigned profile pages
  2. WikiLeaks' only 'friend' on Twitter could become target, too
  3. Feds tracking Americans' credit cards in real-time without a warrant
  4. Droid 2 phone explodes, bloodies Texas man
  5. 2010's biggest security SNAFUs
  6. Is Apple repeating the same mistake it made with PCs?
  7. Is a next-generation firewall in your future?
  8. Verizon's LTE pricing: Good deal or gouge?
  9. Microsoft gains cloud security certification ... six months after Google
  10. Offshoring blamed in part for IT's jobless recovery

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: