Search This Blog

Thursday, July 11, 2013

Agency destroys $170K worth of IT gear over non-existent malware threat

  First Look: Google Chrome 28 browser | 10 Hot Security Startups to Watch
 
  Network World Network Optimization

Forward this to a Friend >>>


Agency destroys $170K worth of IT gear over non-existent malware threat
The U.S. Department of Commerce's Economic Development Administration (EDA) destroyed about $170,000 worth of IT equipment including computers, printers, keyboards and computer mice last year on the mistaken belief that the systems were irreparably compromised by malware. Read More


WEBCAST: IBM

Boost Profitability with Better Planning & Mobile Reporting
This session will discuss how Ashurst, a top-tier legal service provider for private and public sector clients worldwide, was able to effectively manage organizational change and improve their profitability using IBM Business Analytics. Learn More.

WHITE PAPER: FICO (Fair Isaac)

Cloud Analytics for the Masses
Learn the best practices in building applications that can leverage volume, variety and velocity of Big Data for organizations of any size. Learn more.

First Look: Google Chrome 28 browser
A new rich notification feature, a different kind of WebKit and a raft of security fixes made it into the latest stable version of Google's Chrome browser. Read More

10 Hot Security Startups to Watch
Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world. Read More

Matchbox computers: Small is beautiful (and powerful)
Matchbox computers -- small but powerful open-source devices -- are a good way to build your own system and/or carry it with you. We look at the phenomenon and offer a slideshow of examples. Read More


WEBCAST: Fluke Networks

Redefining Performance Management Video
Join Enterprise Management Associates Managing Research Director, Jim Frey, and Fluke Networks Director of Product Strategy, Doug Roberts, for an exclusive free webinar that examines how TruView redefines enterprise performance monitoring and troubleshooting. Learn More

Alert! Study finds Internet users heed browser warnings
Security warnings displayed by Web browsers are far more effective at deterring risky Internet behavior than was previously believed, according to a new study. Read More

EMC battles rogue backups
With a new set of hardware and software releases, EMC is promising to simplify its customers' storage infrastructure by combining different types of operation into a single EMC system. Read More

BYOD breeds distrust between workers and IT
Nearly a third of U.S. workers distrust company software on their mobile devices. Read More


WHITE PAPER: Condusiv Technologies

Guide to 50% Faster VMs - No Hardware Required
For administrators seeking to increase performance in their virtual environment without investing in more hardware, this white paper outlines how I/O optimization technologies deliver performance at a fraction of the cost of hardware for applications with the heaviest workloads. Read more. Read Now!

Amazon slashes prices up to 80% to lure public-cloud weary enterprises
Amazon Web Services Wednesday dropped the price of its dedicated instances, which are virtual machines allocated to individual customers and that do not run on shared hardware. Read More

Microsoft's new app security rules dubbed a paper tiger
One analyst said he believes giving developers six months to fix an app, so as to not scare away developers, is excessive. Read More

Can BYOD Breathe New Life Into the Virtual Desktop?
Seattle Children's Hospital isn't your typical BYOD story. Its mobile device strategy isn't bound by onerous user policies and monitoring software. Rather, the hospital's CIO reports an interesting twist: BYOD is resuscitating ill-fated virtual desktop infrastructure technology. Read More

FCC wasting phone subsidy money, study says
The U.S. Federal Communications Commission has wasted hundreds of millions of dollars on telephone subsidies, with some rich areas of the country receiving up to US$23,000 per line per year from the agency's Universal Service Fund, according to a new study. Read More

 

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: