Search This Blog

Monday, August 22, 2011

What is a next-generation firewall?

Top 10 made-in-China iPhone apps | HP's $99 TouchPad tablet selling out in retailer fire sale

Network World Daily News AM

Forward this to a Friend >>>


What is a next-generation firewall?
If there is a simple way to describe the difference between a next-generation firewall and a traditional firewall, it is "more detailed controls." In firewall terms, people talk about "widening the 5-tuple." Read More


WHITE PAPER: F5

ROI of Application Delivery Controllers
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI. Learn More!

WHITE PAPER: Quantum

Data Deduplication for Dummies
What does data deduplication really mean? This 2nd edition of the book "Data Deduplication for Dummies" takes an in-depth look of the advantages of data deduplication. Learn exactly how data deduplication works, the pros and cons of various approaches, determining the right data deduplication ratio and answers to the most common dedupe questions. Read More

Top 10 made-in-China iPhone apps
Read More

HP's $99 TouchPad tablet selling out in retailer fire sale
Some retailers sold out remaining Hewlett-Packard TouchPad tablets in just a few hours on Saturday after heavily discounted prices attracted buyers to the last remaining units of the soon-to-be defunct tablet. Read More

How does the Google-Motorola deal change mobility?
Google's decision to acquire Android device maker Motorola Mobility raises more questions than it answers. And everyone has questions. Read More


WHITE PAPER: CA Technologies

Infrastructure and Application Performance Management
By integrating application performance management tools with existing infrastructure management solutions, IT will be better positioned to develop a holistic management capability that spans silos, enables proactive problem identification and resolution and ensures the uptime of important business services. Read now

Cisco announces plan to buy Axioss management software
Cisco Systems has agreed to acquire service fulfillment software assets from the UK subsidiary of Comptel, in an effort to help operators speed up the launch of new services, the networking company said on Monday. Read More

Dell unveils next-gen EqualLogic arrays
Dell today announced new versions of its midrange EqualLogic SAN arras, the PS4100 and PS6100, which are now qualified with VMware's vSphere v5.0 and offer the use of 2.5-in drives and solid state drives. Read More

Skype acquiring startup GroupMe for group text messaging
Internet calling company Skype said Sunday that it has entered into a definitive agreement to acquire GroupMe, a startup that offers a free group text messaging and conference call service on mobile phones. Read More


WHITE PAPER: CenturyLink Business

Maximizing The Cloud To Your Needs
Today's enterprise is increasingly IT-dependent and network-based, requiring agile IT infrastructure sourcing approaches to meet rapidly changing business objectives. See how a dynamic, cloud-based infrastructure can flexibly supports key business needs—and whether it's right for your organization. Read now!

No nyms equals evil
Gibbs discusses privacy and pseudonyms and how Google is being particularly evil by demanding "real" names Read More

Buzzblog Summer Reading: Before there was email
(Note: To fill the vacation void, we are dipping into the Buzzblog archives for some lighter fare and more personal items that I enjoyed writing for one reason or another.) This was originally published on April 27, 2006: Before there was e-mail Read More

Domain name changes will help global users, says ICANN chief says
In an interview with Computerworld after announcing his plan to leave ICANN, Rod Beckstrom talked about the group's accomplishments since he was named president and CEO two years ago. Read More

Internet restored in Tripoli as rebels take control
Internet connectivity was restored in Tripoli late Sunday local time, as rebel forces took control of many parts of the capital city of Libya. Read More

10 Scariest Hacks
Researchers from Black Hat and Defcon showed all manner of serious attacks on everything from browsers to automobiles. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. HP's webOS crashes under Apple, Android pressure
  2. Torvalds says, "Virtualization is evil"
  3. Linus Torvalds: ARM has a lot to learn from the PC
  4. With SSL, who can you really trust?
  5. The collar bomber's explosive tech gaffe
  6. HP PC spin-off puts pressure on Microsoft to nail Windows 8
  7. HP plans PC spinoff, $10 billion Autonomy buy
  8. HP kills tablets, confirms PC spin-off plans
  9. Dropbox cloud was a haven for data thieves, researchers say
  10. NSTIC director: 'We're trying to get rid of passwords'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: