Tuesday, May 29, 2012

NSA security expert worries about mobility, cloud

  So you think you know networking? | Consumer Reports: Free anti-malware software for Windows, Mac is effective
 
  Network World Daily News PM

Forward this to a Friend >>>


NSA security expert worries about mobility, cloud
Approaching its 60th birthday, the National Security Agency (NSA) has a staff some 35,000 strong worldwide, and an impressive building complex in Fort Meade, Md., where the walls are lined with copper mesh to prevent electronic eavesdropping. True to its origins dating back to breaking enemy code during World War II, the agency has two primary missions: signals Intelligence (SIGINT) and information assurance (IA). Read More


ARTICLE: Research In Motion

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion
WHITE PAPER: SAP

Creating Community Within Your Business Partner Network
Learn how you can connect with customers and suppliers for business-to-business e-commerce more affordably with SAP Information Interchange OnDemand. Using prebuilt profiles, you can make changes within your supply chain quickly using a minimum of your valuable resources. Learn More

So you think you know networking?
Here's a brief quiz to test knowledge of some well known, some obscure networking terms and events. Read More

Consumer Reports: Free anti-malware software for Windows, Mac is effective
In what could be regarded as a controversial test of anti-malware effectiveness, the influential Consumer Reports publication in its June issue gives its main recommendation to anti-malware freeware for protecting Windows and Mac computers. With some caveats, Consumer Reports says in its "Security Software" article it regards it as unnecessary to buy commercial anti-malware software. Read More

Did Cisco Make the Right Call With Cius?
At the end of last week, Cisco's OJ Winge published a blog announcing that the company would cease investments in its Cius tablet. Does this mean it's end-of-lifing it or killing it as I've read in many of the press articles? No, it does not. Read More


WHITE PAPER: IBM

Proven Strategies for Uncovering Cost Savings
Learn how your organization can take advantage of recent breakthroughs to lower the cost of data management. Learn More

Usage-based Internet service: Sometimes competition in name only
The National Cable and Telecommunications Association (NCTA) held its annual Cable Show in Boston at the end of May. The opening remarks by Michael Powell, ex-chairman of the FCC and current head of the NCTA, were quite good, but he glossed over a basic conflict of interest present in today's cable business. Julius Genachowski, the current FCC chairman, did an even better job of ignoring this issue. Read More

Now Pay Attention, 007: Flame Malware Blurs the Line Between Fiction and Reality
In Ian Fleming's universe of James Bond, the character Q – standing for "Quartermaster" and for so many years played in the film adaptations by Desmond Llewellyn – provides Agent 007 with all of the gadgets and just-out-of-reach-from-the-real-world technological tools he needs to achieve the goals of Her Majesty's Secret Service. One of the most amazing things about Q's technological... Read More

Big Data and NoSQL Still Hot With 10gen Raising $42m
If you had any doubt that the Big Data and NoSQL database market continue to remain red hot, look no further than today's announcement that 10gen, makers of the open source mongodb, raised a staggering $42 million. That is a big raise by anyone's yardstick and further validates the NoSQL-Big Data market. Read More


WHITE PAPER: Dell

High-availability virtualization with Dell PowerEdge servers
Dell 3-2-1 Reference Configurations help companies simplify the design, ordering and deployment of a highly available virtualized infrastructure. This proven architecture is comprised of three servers, two switches and one storage array, plus the software you'll need to manage the environment to support over 500 users. Learn More

Dell reaches for the cloud with new prototype ARM server
Dell on Tuesday announced a prototype low-power server with ARM processors, following a growing demand by Web companies for custom-built servers that can scale performance while reducing financial overhead on data centers. Read More

AT&T demands we change our networks
If you recall, some time ago I had problems with my AT&T U-verse DSL service until a small village's worth of AT&T folk got involved and resolved the issues. Since then, an executive director from the "Office of the President at AT&T," who I'll call "Bob," has followed up with me once a week to make sure things are still OK. Read More

Mind Your Mobile Manners: Top 10 On-the-Go Blunders
Remember when displaying bad manners meant just putting your elbows on the dining table? Today, with all of our mobile devices, we can be rude anywhere at any time. Read More

Academia joins in battling Android malware
Android Malware Genome Project kicks off by contributing collection of more than 1,200 malware in 49 different families Read More

 
 
 

SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending May 25
  2. Cisco all but kills Cius tablet computer
  3. RIM said to plan to lay off 2,000 staff
  4. Gartner: Don't trust cloud provider to protect your corporate assets
  5. Researchers identify Stuxnet-like cyberespionage malware called 'Flame'
  6. Extreme BYOD: When consumer tech goes to unexpected places
  7. Gearhead: Hardware we want to get our hands on
  8. Sales of unused IPv4 addresses gathering steam
  9. Cisco takes its lumps, keeps developing video meeting tools
  10. Patch management still big stumbling block in risk management, survey shows
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment