Thursday, December 20, 2012

33 Best & Worst Celebrity Tech Moments of 2012

  Why one retailer is migrating away encryption to protect customer data | VMware patches 'critical' vulnerability
 
  Network World Daily News PM

Forward this to a Friend >>>


33 Best & Worst Celebrity Tech Moments of 2012
If you want to keep up with the Kardashians you really need to sport a Windows Phone 8 Lumia 900 phone, as Kourtney Kardashian told us this year. If you wanna get in tight with Lady Gaga, you need to join her own social network. And if you really want to learn about what made Steve Jobs tick, only Ashton Kutcher can enlighten you. Here are the best – and mostly worst – celebrity tech moments of 2012: Read More


WEBCAST: Navisite

Desktops as a Service: Sorting Fact From Fiction
This webcast looks at the realities of taking desktops to the cloud in a reliable, manageable way. It explores the role of virtualization and hosted services while examining the intricacies of Microsoft licensing. It's a must-see event for anyone looking to leverage the realities of DaaS. View now.

WEBCAST: Meru Networks

Impact of 802.11ac on WLAN
In this webinar, industry expert Craig Mathias and Robert Crisp from Meru Networks will discuss the impact 802.11ac will have on enterprise WLAN networks and how to best prepare for it. Learn more.

Why one retailer is migrating away encryption to protect customer data
For retailers, protecting customer payment-card information is critical, and encryption is the typically the way to do that today. But Crutchfield Corp, which sells electronics and other goods online and through catalogs, has decided to migrate away from encryption in favor of an alternative security technology known as tokenization in order to shield sensitive customer data. Read More

VMware patches 'critical' vulnerability
VMware has issued a patch for its VMware View product that fixes a security vulnerability that could allow an unauthorized user to access system files. Read More

DOJ to use prosecutorial powers in state-sponsored cyberespionage
The Department of Justice (DOJ) plans to throw its prosecutorial weight behind efforts to stem the growing number of foreign government-sponsored cyberattacks against U.S. companies and government agencies. Read More

McAfee Inc. takes reputation beating after founder fled police
In the wake of his Belize neighbor's unsolved murder, John McAfee's lurch through the news damaged the reputation of his namesake, the security company McAfee Inc., a brand expert said Thursday. Read More


WHITE PAPER: HP

Extend the Life of Your Storage
Leveraging deduplication in backup environments yields significant advantages. The cost savings in reducing disk capacity requirements change the economics of disk-based backup. Read Now!

Road warriors' essential mobile toolkit
What you should always carry in your briefcase or backpack -- or on your mobile device itself Read More

Software-defined networks need better traffic visibility
Most of the focus of software-defined networks (SDNs) has been on how it impacts the layer 2/3 switch vendors. The industry seems to have moved off of this notion that it commoditizes the underlying infrastructure, but recently another question has come up. Big Switch recently launched the company and related products, one of which is called "Big Tap," that provide traffic visibility functionality... Read More

Facebook bans developer of timeline-cleaning browser extension
The developer of a browser extension that lets Facebook users block some types of content from their newsfeeds called Fluff-Busting Purity says the social network's legal department has banned him from the site, accusing him of violating the terms of service. Read More

IBM analysis of Twitter, Facebook and other social sites says you're gonna love holiday travel this year
Maybe the direction had nowhere to go but up or maybe people really just need to get away regardless of how annoying car and air travel has become. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

World of botnet cybercrime paying pretty well these days
The world of cybercrime is getting more specialized as an eco-sphere of helpers in running botnet operations has developed, according to one security researcher who spent over a year monitoring online forums and communities. Read More

The Mayans really predicted the release of E17
On Friday, December 21st, 2012, the world won't be ending. But something far, far more surprising will be happening. In fact, the most improbable event, in human history, will occur on December 21st. That's right. I'm talking about the release of Enlightenment 17 (aka "E17"). Not familiar with E17? Here's a quick overview. *Clears throat* Read More

FCC issues security guidance to smartphone users
The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. Read More

The 2012 tech news quiz
From the Facebook IPO to McAfee on the run to the much needed iPad Mini, 2012 has been a busy and wild year in technology Read More

 
 
 

SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Boeing uses 20,000 pounds of potatoes to check aircraft wireless network signals
  2. Cisco sacrificing one for another?
  3. World of botnet cybercrime paying pretty well these days
  4. Citrix: What kind of company is it anyway?
  5. Readers deserved to know of Google's supporting role
  6. 15 free security tools you should try
  7. How removing 386 support in Linux will destroy the world
  8. 7 technologies poised for failure in 2013
  9. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  10. 10 of the most useful cloud databases
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment