Search This Blog

Tuesday, January 15, 2013

VMware one-ups Microsoft with vSphere 5.1

  The big time travels of Eric Schmidt | 77 MORE great ideas for running a security program
 
  Network World Security

Forward this to a Friend >>>


VMware one-ups Microsoft with vSphere 5.1
The race for virtualization dominance between Microsoft and VMware has become more interesting with VMware's recent release of vSphere 5.1. We obtained vSphere around the same moment as the final release of Windows Server 2012, whose newly included virtual switch and enhanced Hyper-V features were designed to clobber VMware. Read More


RESOURCE COMPLIMENTS OF: Sophos

Free Next-Gen Firewall Hardware Offer
Buy your Sophos next-gen firewall before the end March 2013 and get the hardware for free. Learn more.

WHITE PAPER: HP & Intel® Xeon® Processors

Blade Servers eGuide
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

The big time travels of Eric Schmidt
Google's Executive Chairman Eric Schmidt has had quite an entourage, from President Obama to Steve Jobs and Bill Gates Read More

INSIDER
77 MORE great ideas for running a security program
Last year's collection of great ideas was so well received that we decided to do an encore. We've scoured our archives for ideas from CSOs, academics, consultants and philosophers, for concepts big and small. What these ideas have in common is the ability to elevate your department and your career. So grab your highlighter, start each day by reading until you hit an idea that challenges you, mark it, and try it. Rinse and repeat. 1 Cut everybody's speaking time to 5 minutes in this months meetings Experiment: Before your next status meeting, rule that each speaker has only five minutes to speak. Enforce this limit without exception, ideally by putting a kitchen timer on the conference table. See if you get the same amount of information, and whether it clarifies and prioritizes everyone's thinking as they prepare for the meeting. If the rule works, keep it. CLICK HERE TO DOWNLOAD THE PDF Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Oracle rushes patch to quash critical Java bugs
Oracle on Sunday issued an emergency Java update to patch two critical vulnerabilities, including one that had been exploited in ongoing and accelerating attacks. Read More

5 places your data goes to hide
From autosaved spreadsheets to test systems using real data -- CISOs warn of five oft-overlooked sources of data leaks Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Worldwide IT spending to grow this year, Gartner says
Enterprises that buy new mobile devices and invest in security and storage management will give worldwide IT spending a boost this year. Read More

Is CES a thieves' paradise?
The International CES is packed to the rafters with the latest in shiny, often expensive high-tech gadgets, so it's no surprise that theft is a problem for companies exhibiting at the show. Read More

Hackers say coming air traffic control system lets them hijack planes
An ongoing multibillion-dollar overhaul of the nation's air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025. Read More

US-CERT: Disable Java in browsers because of exploit
Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday. Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft to release emergency Internet Explorer patch on Monday
  2. iPhone 6 rumor rollup for week ending Jan. 11
  3. Chrome 24 vs. Firefox 18 - head to head
  4. VMware one-ups Microsoft with vSphere 5.1
  5. Why entrepreneurs innovate better than managers
  6. Best of CES 2013: in pictures
  7. 5 takeaways from CES 2013
  8. IT pros reveal the best career advice they ever received
  9. Oracle patches latest zero-day vulnerabilities in Java
  10. Best practices to mitigate DDoS attacks
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: