Search This Blog

Thursday, January 13, 2011

2011's 25 Geekiest 25th Anniversaries

Google pays record bounty for Chrome bug | Former TSA contractor gets two years for damaging data

Network World Daily News AM

Forward this to a Friend >>>


2011's 25 Geekiest 25th Anniversaries
Five years makes an official franchise, no? Either way, what follows is this year's edition of our annual collection of the year's "geekiest anniversaries." Read More


WHITE PAPER: ParAccel

The Problem with Data Warehousing
Tackle the most complex analytic challenges and glean insight from vast amounts of data. Learn how a columnar-based, massively parallel processing analytic database can provide high performance analytics against complex SQL workloads the most challenging analytic queries. Read now!

WHITE PAPER: Quantum Corporation

Long-Term Data Retention – Key Considerations
Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now

Google pays record bounty for Chrome bug
Google Thursday said it patched 16 bugs in the Chrome browser, including one tagged as critical that brought its founder a record $3,133 bounty. Read More

Former TSA contractor gets two years for damaging data
A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S. Read More

Bob Muglia aside, the brain drain at Microsoft is a good thing
Microsoft's replacements in other key positions are moving the company in a better direction. Read More

Palin e-mail snoop imprisoned, despite judge's recommendation
The 23-year-old Tennessee man convicted of illegally accessing Sarah Palin's Yahoo e-mail account during the 2008 presidential campaign has begun his one-year sentence in a Kentucky prison, despite a recommendation from the trial judge that he serve the time in a halfway house. Read More


WHITE PAPER: ParAccel

Tackle the Most Challenging Analytic Queries
Learn how a columnar-based, massively parallel processing database can provide ultra fast analytics with: • Schema-neutral, load-and-go analysis • High performance against complex SQL workloads • All-in-memory processing Read now!

Tablet battle to heat up, prices to fall in 2011
Last week's Consumer Electronics Show was indisputably dominated by tablets. Almost a year since Apple redefined portable computing with its iPad, competitors launched attempts to cut the Cupertino company's lead. Taken together, the announcements at CES provide a much clearer picture of the likely evolution of the tablet market in 2011 and provide consumers a few tips on what to look for and when to buy. Read More

RIM Warns of BlackBerry Browser, BES Vulnerabilities
BlackBerry-maker Research In Motion (RIM) yesterday issued two separate security advisories warning both BlackBerry smartphone users and corporate BlackBerry Enterprise Server (BES) administrators of newly discovered security flaws in many versions of RIM's BlackBerry handheld software and in BES. Read More

Sprint issues mysterious, magical invite for Feb. 7
The one-upmanship between carriers will continue Feb. 7, as Sprint has issued an invitation to a press event in New York City featuring magician David Blaine and "yet another industry first" from Sprint. Read More

Cisco defrauder sentenced to 4 years
A Massachusetts man was sentenced to four years in prison for defrauding Cisco out of $15 million, the latest in a regular string of selling-replacement-Cisco-parts-for-profit schemes. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Will Apple remove the home button from the next-gen iPad and iPhone?
Steve Jobs is notoriously frugal when it comes to buttons so the latest rumor emanating out of Cupertino might not come as a huge surprise. Read More

Federal watchdogs outline 6 critical electricty grid cybersecurity challenges
As the country's electricity grid undergoes a transformation and moves toward a more intelligently networked, automated system, it faces an increasing amount cybersecurity issues. Read More

Can Open Source Companies Win In A MadMax Market?
Matt Aslett says only Red Hat can survive in a post-apocalyptic commoditized wasteland. Read More

Jon Stewart: Long national iPhone nightmare is over
The Daily Show led off Tuesday night's episode with a segment during which host Jon Stewart celebrated the "Freedom!!!" now being offered Apple iPhone users who want to switch from AT&T's network to Verizon's. Read More

Handbook of technology management
Long-time readers know that I am a fan of Dr. Hossein Bidgoli, surely one of the most prolific creators of encyclopedias in history! Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  2. Sony shutting plan that used to make 18M CDs a month
  3. The Verizon iPhone: Seven key facts you need to know
  4. 2011's 25 geekiest 25th anniversaries
  5. Author warns of Russia's and China's 'Spinternet'
  6. Apple iPhoneys: the iPhone 5 edition
  7. Microsoft fights Apple trademark on 'App Store'
  8. AT&T and Verizon iPhone plans compared
  9. Cisco attorney's perceived anti-Semitism sends company back to court
  10. Be like Larry and Sergey: Google invites teens to online science fair

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: