Search This Blog

Thursday, January 20, 2011

12 geekiest snow and ice sculptures

Three personal VPNs offer safer Wi-Fi | FCC urged to approve body area network plan

Network World Daily News PM

Forward this to a Friend >>>


12 geekiest snow and ice sculptures
When the going gets cold, the Linux, Mac, Star Wars and other geeks get creative. Read More


WEBCAST: Wildpackets

10G Analysis & Troubleshooting without Compromise
You need to analyze and troubleshoot 10 Gig network traffic without suffering dropped packets or having to slice, filter and dissect your network segments. Learn how with a TimeLine appliance you can have real-time network performance, including VoIP statistics, while capturing all packets to disk. View Now

WHITE PAPER: HP

A Necessity for Retail Banking
Results from this 2010 study reveal the challenges the retail banking industry faces. This sector recognizes the importance of effective information management to ensure operational efficiency and protect sensitive data, however survey results suggests that they many not be fully prepared for the challenge. Read More Now!

Three personal VPNs offer safer Wi-Fi
It's a truth universally acknowledged that public Wi-Fi hotspots aren't secure, but they're so convenient that most of us use them anyway. That's why there was something of a panic last year when Eric Butler showed everyone how easy it is to hijack Facebook, Twitter and PayPal accounts on open Wi-Fi networks via his FireSheep Firefox add-on. Read More

FCC urged to approve body area network plan
Representatives of the Aerospace & Flight Test Radio Coordinating Council, Philips Healthcare and GE Healthcare met with the FCC to strongly urge timely adoption of a frequency band for medical body area networks. Read More

Is Apple expanding use of new tamper-resistant screw for its iPhone?
Apple is switching to an unusual and rare type of exterior screw for its iPhone and other mobile products, making it much harder for users to take them apart and fool around with the internals, according to a Website that specializes in dissecting popular electronic devices. Read More


WHITE PAPER: HP

The Philosophy of Security
Security is often looked at from the perspective of fear, but a holistic approach can prove more effective. This paper explains how to find more meaningful ways of using technology to achieve an effective security strategy. Learn how to apply basic philosophical approaches to your organization's security. Read More Today!

'Cinderella' tax break may boost IT buying this year
A one-year bonus depreciation tax credit could significantly boost IT spending this year, say financial industry experts. Read More

AT&T and Sprint, How Stupid Do You Think We Are?
Great news! Starting Jan. 23, AT&T will reportedly funnel all of its new subscribers into a $10 per month, 1,000-text message plan. Read More

Huawei: More trials of TD-LTE in Asia expected
The next generation mobile technology TD-LTE will see more trials across Asia in the coming year, but commercial use will take longer than in North America and Europe, according to Chinese networks supplier Huawei. Read More


WHITE PAPER: Diskeeper

Defragmentation in Virtualized Environments
Performance corrupting file fragmentation is severely compounded on virtual platforms and threatens to undo most of its efficiency benefits. Coordinating defrag resources between VMs was an insurmountable barrier until recent innovations eliminated conflicts. Learn More

Social networking security threats taken too lightly
There's a gap between reports of malware generated from social networking sites and the potential threat businesses perceive, according to results of Sophos' s "Security Threat Report 2011". Read More

Cisco: Fraudster's money mules in short supply
A new security report from Cisco Systems estimates that the amount of stolen online bank account data far exceeds the number of people fraudsters can get to transfer stolen funds, who are known as "money mules." Read More

OSI, FSF want inquiry of Microsoft consortium deal on Novell
The Open Source Initiative fears that the CPTN consortium will use its Novell patents for nefarious purposes. Read More

Soundminer Android malware listens, then steals, phone data
Researchers have developed a low-profile Trojan horse program for Google's Android mobile OS that steals data in a way that is unlikely to be detected by either a user or antivirus software. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Yahoo IPv6 upgrade could shut out 1 million Internet users
  2. Cause of Windows Phone 7 data spikes found
  3. Fake GSM base station trick targets iPhones
  4. Apple reveals most downloaded iPhone, iPad apps of all time
  5. NASA background security checks do not go too far
  6. NSA breaks ground on Utah 'spy center' data center
  7. Cisco IOS vulnerabilities uncovered
  8. Cisco's 800-pound gorilla: Xsigo
  9. Panic time quiz: How prepared are you for IPv6?
  10. Gamers hijacked your server? Might be an inside job

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: