Search This Blog

Monday, February 28, 2011

How to turn Chrome into gold

Google scrambling to restore Gmail to 150,000 users | Three-time Pwn2Own winner knocks hacking contest rules

Network World Daily News AM

Forward this to a Friend >>>


How to turn Chrome into gold
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system. Read More


WHITE PAPER: Riverbed

ANPM Vendor Analysis
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

Google scrambling to restore Gmail to 150,000 users
Google engineers continue to work this morning to restore Gmail accounts to the about one-tenth of one percent of users who found all their stored data had gone missing yesterday. Read More

Three-time Pwn2Own winner knocks hacking contest rules
Organizers of Pwn2Own on Sunday defended the hacking contest's rules after a three-time winner criticized the challenge for encouraging researchers to "weaponize" exploits. Read More

Canonical calls original proposal a "mistake" and overrides Banshee team's decision
Canonical has gone back to the drawing board on its affiliate deal with Banshee, saying the previous proposals to the Banshee team were "mistakes." Canonical is now enabling the Amazon store by default, and also giving a 25% cut of its revenue from Banshee and Rhythmbox's Ubuntu One Store to GNOME. Read More

Verizon, Motorola offering LTE for public safety networks
Verizon and Motorola are teaming up to give public safety agencies access to their own LTE networks that can be supplemented by Verizon coverage when needed. Read More


WHITE PAPER: Sprint

Why 4G for the Enterprise?
As the US economy slowly recovers in 2010, enterprise cautiousness toward purchases of enterprise communications technology continues. Enterprises will only adopt communications technology that offers the best value in terms of scalability, ROI and worker productivity. Learn more

IT management on the go, iPhone style
Amid all the fun and games -- OK, legit business productivity tools too -- IT-professionals-cum-iPhone-users can now find a management app from popular freeware company Spiceworks. Read More

Security information and event management tools require 'fine tuning,' user says
Security information and event management (SIEM) equipment is valuable for getting a bird's-eye view of security in the enterprise, but there are deployment challenges that IT security managers need to recognize. Read More

Why are there so few Windows Phone 7 models on the market?
This week's news that Sprint is finally going start selling a smartphone next month running Microsoft's Windows Phone 7 operating system, and reports that Verizon is expected follow suit, is good news for Microsoft's efforts to widen the distribution pipeline for the OS. But Microsoft's product strategy strikes me as somewhat timid, given that it still has only a handful of handset models. Read More

This Just In: Consumer Reports Identifies That Ol' Antenna Problem in Verizon iPhone
AntennaGate is apparently still with us.Consumer Reports has just published a review of the Verizon iPhone 4 that seems to indicate that the "AntennaGate" problem has indeed returned - and this time in an entirely different engineering release of the iPhone 4. This is weird, to say the least. Read More


WHITE PAPER: IBM

Using BPM and Business Analytics Together
How do organizations become agile enough to proactively respond to all this change? They require processes, analytics and structures that give them real-time situational awareness into occurrences both inside and outside the organization. Read now!

Is VoIP too secure?
It's hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on - especially if it traversed the Internet. Read More

Fake online 'girlfriend' bilks $200,000 from Illinois man
On Friday we wrote of federal crime statistics that indicted a modest decline in online crimes, in particular, confidence scams where criminals pretend they are an inheritance recipient, lottery winner ... or romantic interest. Read More

Can data stored on an SSD be secured?
Following a recent report that data on most SSDs is very difficult to completely erase, researchers and analysts say there are really only two methods to ensure sensitive data is secure once you're finished using your SSD. Read More

Microsoft pooh-poohs Google Cloud Connect
Yesterday, Google released a tool that let's Microsoft Office users automatically sync and share documents on their PCs via Google Docs. Today, Microsoft fired back in a blog post that accuses Google Cloud Connect of being difficult to install, a potential cause of data loss, a drain on application performance and a security/privacy risk. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Retro browser war: IE6 vs. Netscape in 2011
  2. The 6 biggest misconceptions about IPv6
  3. Happy Birthday Steve Jobs. Apple CEO turns 56 today
  4. Apple's iPad 2 one more thing: iTunes in the cloud?
  5. Snooping on social networks to vet jurors and hire employees
  6. Anonymous: It's a trap!
  7. Juniper leapfrogs Cisco with QFabric data center product blitz
  8. Pay no attention to that widget recording your every move
  9. Hollywood has had its fill of Apple brand placement
  10. Is IT skills gap keeping companies from hiring?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: