Monday, March 07, 2011

Is your company at risk of an IPv6 brain drain?

Wells Fargo says no to personal smartphones and tablets, period | Facebook Privacy: 10 Must-Know Security Settings

Network World Daily News AM

Forward this to a Friend >>>


Is your company at risk of an IPv6 brain drain?
Timothy Winters, senior manager at the University of New Hampshire's InterOperability Laboratory, gets calls every week from headhunters looking to hire network engineers, network architects and software developers with experience in IPv6, the looming upgrade to the Internet's main communications protocol. Read More


WHITE PAPER: Polycom

Learn 6 key best practices for successfully implementing UC.
Discover which strategic design and other considerations play critical parts in achieving your ROI objectives. Learn how to develop an implementation strategy that reflects the needs of your organization. Read now.

WEBCAST: Trend Micro

Deep Security with Trend Micro
Watch this video of users of Trend Micro Deep Security and hear how it is ensuring regulatory compliance and preventing server, desktop and cloud data breaches. View now!

Wells Fargo says no to personal smartphones and tablets, period
Wells Fargo imposes strict regulations on employee-owned mobile devices and social networking sites because of security risks. Read More

Facebook Privacy: 10 Must-Know Security Settings
Facebook's seemingly endless tweaks to privacy and security settings leave many people wondering: How secure is my Facebook account? We've rounded up the 10 most important settings for you to check. Read More

AT&T's iPhone 4 beats Verizon's on data downloads, Metrico says
The iPhone 4 on AT&T's network downloaded data twice as fast, on average, as the iPhone on Verizon Wireless, according to thousands of recent field tests in five U.S. cities conducted by Metrico Wireless, an independent mobile device performance evaluation company Read More

Microsoft can't wait for IE6 to die
Microsoft is counting down the IE6 browser's dying breaths with a new website. Read More


WHITE PAPER: VeriSign

The State of Internet Vulnerability
What's being done to alleviate Internet vulnerabilities? Are you, or your company, susceptible to threats such as man-in-the-middle attacks and cache poisoning? This white paper reports the results of recent research and examines who is affected by Domain Name System insecurities. Read Now

Microsoft inspires fresh round of anti-IE6 prose
There are only so many ways to say "IE6 needs to go," yet headline writers find themselves straining again to find new ones (and not always succeeding) in response to Microsoft's launch of "The Internet Explorer Countdown" site. Read More

WordPress: DDoS attacks came from China
The large distributed denial of service (DDoS) attacks that hit the WordPress.com blog publishing platform last week originated from China, according to the founder of the site. Read More

After attacks, Google vows to fortify Android Market
Google will build new safeguards into Android Market, its application store for the Android mobile OS, following an attack that infected thousands of phones and forced the company to wipe the malware remotely from phones, it said late Saturday. Read More

The new cloud tool kit
While the term "cloud" still puts many people off, chances are good that within a few years most companies will have a mix of legacy infrastructure, private cloud pods, public cloud services (SaaS or other), and resources at co-location or hosted facilities. Some people look at that say that's just business as usual, while others say it adds up to one big IT cloud. Nomenclature aside, the question remains: how will you manage it holistically? Read More


WEBCAST: Dell

Webcast: Is Virtualization Right for SMBs?
You've heard that large companies embrace virtualization to consolidate their data centers, reduce costs, and improve operating efficiency and IT service levels. However, your data center only has tens of servers, not hundreds or thousands. Should you consider virtualization as well? View this webcast to learn more. Register now!

Cisco partners not affected by product transition
Cisco partners say they are not impacted by the product transition challenges, particularly in switching, currently affecting the company. Read More

Top student charged with fixing grades for cash
A Nevada student who gave the opening address at his high school graduation last year has been charged with breaking into his school district's computer system and bumping up his classmates' grades for a fee. Read More

Adobe CEO's pay more than doubles to $12.2 million
2010 was a good year for Adobe Systems CEO and President Shantanu Narayen, whose $12.2 million compensation package is more than double the $5 million he received in 2009. Read More

Two-man team directs Juniper's innovation
To the storied names of Bill Gates and Steve Ballmer, Steve Jobs and Tim Cook, add Kevin Johnson and Pradeep Sindhu. Read More

Management Vendors Fail to Measure "Real" User Experience
We have a problem, Houston. IT managers want to measure their users' real experience, but the vendor-supplied tools at their disposal do not spit out the measurements they need. Here's why we make this heretical statement. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. IPv6 on home routers and DSL/cable modems: FAIL
  2. Cisco, sources reveal data center next steps
  3. Tablet Tumble: iPad 2 vs. Motorola Xoom
  4. 20 hot IT security issues
  5. Real life HAL 9000: computers reacting to human emotions?
  6. First look at Apple iPad 2: what's new, unchanged, still missing
  7. Open source expert takes on the hardest job at Microsoft
  8. iPad 2 both excites and frustrates business customers
  9. Google gives antiquated 404 page a makeover
  10. 4 reasons why Apple and its iPad still rule the tablet market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment