Search This Blog

Monday, August 17, 2015

REVIEW: Best open source reporting tools

Kaspersky denies faking anti-virus info to thwart rivals | 12 cool gadgets to soothe those back-to-school blues

Network World Network/Systems Management

INSIDER
REVIEW: Best open source reporting tools
Always on the lookout for open source alternatives to pricey commercial offerings, we wondered if open source reporting tools could hold a candle to the established commercial products. For this review we selected the community/open source versions of three commonly used reporting tools, Eclipse BIRT, JasperReports and Pentaho. Our focus was on usability, data access, platform support, report creation and web publishing. (Insider Story) Read More


: Citrix Systems

eGuide: WAN Virtualization
In this eGuide, Network World examines the benefits of WAN virtualization and some recent trends in this area. Read on to learn how WAN virtualization can help your organization. Learn More

WHITE PAPER: PC Connection

5 Steps to Help Defend Your Network
The Cisco ONE Enterprise Networks Architecture can provide the necessary levels of application intelligence, contextual information, visibility and automated control to enable the network to be the foundation for companies today as well as in the future. Learn More

Kaspersky denies faking anti-virus info to thwart rivals
Responding to allegations from anonymous ex-employees, security firm Kaspersky Lab has denied planting misleading information in its public virus reports as a way to foil competitors. Read More

12 cool gadgets to soothe those back-to-school blues
Gear like this makes the return to a classroom significantly less painful. Read More

Zero-day flaw in Google Admin app allows malicious apps to read its files
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work accounts. Read More


: KPMG

KPMG Presents Cybersecurity
In this eGuide, Network World, CSO, and IDG News Service examine some of the latest trends in cyberattacks and cybersecurity. Read on to learn how to help raise your organization's security posture. Learn More

Italian teen finds two zero-day vulnerabilities in OS X
An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer. Read More

Software upgrade could be cause of US airline disruption
A computer glitch that disrupted airline traffic in some parts of the U.S. over the weekend was possibly the result of a software upgrade, the Federal Aviation Administration said Sunday. Read More

Happy 20th birthday Internet Explorer
IE started behind the curve, but Microsoft set out to compete with top dog Netscape Navigator. Read More


WHITE PAPER: Silver Peak Systems Inc

5 Reasons why Enterprises are Moving to Broadband Their WAN
The WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. Ultimately the way that enterprises and their users do business has changed - and so must their approach to connectivity. Learn more >>

AT&T a closer partner of NSA than previously known, Snowden docs show
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known. Read More

Mozilla tests a true stealth mode for Firefox
Mozilla wants to make private browsing truly private. The company is testing enhancements to private browsing in Firefox designed to block website elements that could be used by third parties to track browsing behavior across sites. Read More

At what point do white hat hackers cross the ethical line?
In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. Read More

Hacking Team gives us incontrovertible proof of targeted mobile threats
The data from the recent Hacking Team breach provides yet another example of governments actively using targeted malware. While state-sponsored hacking has been going on for some time, a new wrinkle is emerging. Read More


SLIDESHOWS

User guide to Windows 10

Windows 10 officially launches this week, so if you're going for an immediate upgrade from your Windows 7 or Windows 8/8.1 computer, this guide will get you up to speed as quickly as possible.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 13 big data and analytics companies to watch

2. 10 more fascinating things to do with a Raspberry Pi

3. FREE COURSE: Learn basic Cisco networking

4. Microsoft's rollout of Windows 10 gets B+ grade

5. HTC is dead in the water

6. Proposed solutions for fixing Reserve Windows 10 problems

7. Ten scary hacks I saw at Black Hat and DEF CON

8. Windows 10 is possibly the worst spyware ever made

9. Cisco warns customers about attacks installing rogue firmware on networking gear

10. 19 free cloud storage options


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: