Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Thursday, May 31, 2007
GroupWise 7.0.2/6.5.7 Security Vulnerability
GroupWise system that impacts all clients and servers. The vulnerability
allows a malicious user to intercept authentication credentials through
a "man-in-the-middle" mechanism.
Novell Technical Services has created a Technical Information Document
( http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3382383&sliceId=SAL_Public&dialogID=37078655&stateId=1 ) (TID) that details how to address the vulnerability, with links to the relevant patch downloads. Please access the TID and apply the associated patches as soon as possible.
If you have questions or concerns, please contact your Novell sales or
support representative.
---
You are currently subscribed to security-alerts as: [security.world@gmail.com]
To unsubscribe, forward this message to leave-1884204-37801175T@list.novell.com
The week's most-read stories
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso. This newsletter is sponsored by ShoreTelBONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
Wireless Report: Attackers get chatty on VoIP
WIRELESS REPORT
http://www.infoworld.com/
========================================================================
Thursday, May 31, 2007
* Attackers get chatty on VoIP
* Samsung embeds 4GB storage for 3G phones
* Symantec mobile security client delayed
* Nokia to ship phones based on China's 3G standard
* Beatnik speeds mobile music downloads
* Google offers mobile access to calendar service
* Update: EarthLink to build out full Philadelphia Wi-Fi network
* RIM plans Wi-Fi BlackBerry
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
ENABLING A DATACENTRIC APPROACH TO SECURITY
As security landscape changes and new threats present themselves, the
security measures that companies employ must also change. This on-demand
webcast discusses how and why companies must move from perimeter and
infrastructure protection to protecting the data itself.
http://newsletter.infoworld.com/t?ctl=17ABBAE:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================
ATTACKERS GET CHATTY ON VOIP
The recent spate of malware attacks propagating throughout the user base
of the Skype Internet calling system illustrates a broader trend toward
cyber-criminals moving to take advantage of VoIP platforms as they
become increasingly popular.
http://newsletter.infoworld.com/t?ctl=17ABBA5:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
========================================================================
SAMSUNG EMBEDS 4GB STORAGE FOR 3G PHONES
Samsung Electronics has squeezed 4GB of storage into a mobile phone chip
set that the manufacturer believes could eliminate the need for external
memory card slots.
http://newsletter.infoworld.com/t?ctl=17ABBA2:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
========================================================================
SYMANTEC MOBILE SECURITY CLIENT DELAYED
Symantec has delayed the release of its first security suite for
Windows Mobile devices.
http://newsletter.infoworld.com/t?ctl=17ABBA4:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
ENABLING A DATACENTRIC APPROACH TO SECURITY
As security landscape changes and new threats present themselves, the
security measures that companies employ must also change. This on-demand
webcast discusses how and why companies must move from perimeter and
infrastructure protection to protecting the data itself.
http://newsletter.infoworld.com/t?ctl=17ABBAE:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================
NOKIA TO SHIP PHONES BASED ON CHINA'S 3G STANDARD
Nokia is getting ready to ship mobile phones based on China's
homegrown 3G (third-generation) mobile standard.
http://newsletter.infoworld.com/t?ctl=17ABBA8:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
========================================================================
BEATNIK SPEEDS MOBILE MUSIC DOWNLOADS
U.S. software company Beatnik is approaching mobile phone operators with
a new music download system that compresses songs up to 10
times more than the MP3 format, allowing for faster downloads on
lower-end mobile phones equipped with the company's software.
http://newsletter.infoworld.com/t?ctl=17ABBA7:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
========================================================================
GOOGLE OFFERS MOBILE ACCESS TO CALENDAR SERVICE
Users of Google Calendar can now access their schedules from their mobile
phones.
http://newsletter.infoworld.com/t?ctl=17ABBA3:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
========================================================================
UPDATE: EARTHLINK TO BUILD OUT FULL PHILADELPHIA WI-FI NETWORK
The sun came out for EarthLink's Philadelphia Wi-Fi network on
Thursday even as prospects for its San Francisco
project remain shrouded in fog.
http://newsletter.infoworld.com/t?ctl=17ABBA1:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
========================================================================
RIM PLANS WI-FI BLACKBERRY
Research In Motion expects to start selling a BlackBerry with both
cellular and Wi-Fi wireless capabilities, the company's CEO said
Wednesday.
http://newsletter.infoworld.com/t?ctl=17ABBA6:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
======================================================================
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
ENABLING A DATACENTRIC APPROACH TO SECURITY
As security landscape changes and new threats present themselves, the
security measures that companies employ must also change. This on-demand
webcast discusses how and why companies must move from perimeter and
infrastructure protection to protecting the data itself.
http://newsletter.infoworld.com/t?ctl=17ABBAE:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE
The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.
http://newsletter.infoworld.com/t?ctl=17ABBAA:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
======================================================================
ADVERTISE
To advertise, contact Kate_Hobbie@infoworld.com.
======================================================================
UNSUBSCRIBE/MANAGE NEWSLETTERS
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=17ABBAB:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
Contact Customer Service at: customerservice@infoworld.com
To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=17ABBAC:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4
Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107
This message was sent to: security.world@gmail.com
InfoWorld Daily: How to avoid being a 'buffer' from the brass
INFOWORLD DAILY: INFOWORLD STAFF
http://www.infoworld.com/
========================================================================
Thursday, May 31, 2007
* How to avoid being a 'buffer' from the brass
* InfoWorld Daily Podcast
* Private equity and Novell: Perfect together?
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
10 ESSENTIAL STEPS TO WEB SECURITY
Web security shouldn't be a gamble. This guide summarizes the 10
essential steps to web security and the principles behind them.
Click here to download now, compliments of Clearswift:
http://newsletter.infoworld.com/t?ctl=17ABBBD:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
INFOWORLD ZERO DAY PODCAST
Covering business and IT strategies for securing the enterprise,
InfoWorld's Bob Garza covers anti-spam, anti-spyware, application layer
security, biometrics, digital identity, intrusion detection, malware and
more Sponsored by IronPort.
http://newsletter.infoworld.com/t?ctl=17ABBB7:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
========================================================================
HOW TO AVOID BEING A 'BUFFER' FROM THE BRASS
Careers: One reader writes in to ask Bob Lewis an ostensibly simple
question about tips he might have to help managers avoid becoming a
barrier to communication instead of a promoter of it. "The way to avoid
this problem is for upper management to stop causing trouble. It's easy
to say but hard to achieve," Lewis asserts in this Advice Line post. A
more realistic answer, though, is that managers should be brutally
honest with themselves. "It's something every employee should do on a
regular basis, in fact." The news beat: Palm grows into the ultramobile
realm with Foleo, a... ...
More of this blog:
http://newsletter.infoworld.com/t?ctl=17ABBB5:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
========================================================================
INFOWORLD DAILY PODCAST
Palm unwraps Linux-based ultramobile PC as smartphone companion, Google
buys Panoramio, releases Gears for offline access to Web apps, Motorola
cuts 4,000 workers, and more LISTEN!... ...
More of this blog:
http://newsletter.infoworld.com/t?ctl=17ABBB4:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
========================================================================
PRIVATE EQUITY AND NOVELL: PERFECT TOGETHER?
Best of the blogs: Here's a suggestion that might surprise some, though
not all, of you readers. Private equity should buy out Novell. "What
Novell needs is to be taken off the public market so that it can regroup
and make difficult decisions that Wall Street doesn't have the patience
to permit," Matt Asay asserts. "I think that it will be too hard to
effectuate the necessary changes without getting off the quarterly Wall
Street treadmill." Hardware: While it's not quad-core, a magic key does
exist to a quantum jump in virtual server density, according to Tom
Yager. Getting much,... ...
More of this blog:
http://newsletter.infoworld.com/t?ctl=17ABBB6:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
10 ESSENTIAL STEPS TO WEB SECURITY
Web security shouldn't be a gamble. This guide summarizes the 10
essential steps to web security and the principles behind them.
Click here to download now, compliments of Clearswift:
http://newsletter.infoworld.com/t?ctl=17ABBBD:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE
The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.
http://newsletter.infoworld.com/t?ctl=17ABBB8:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
======================================================================
ADVERTISE
To advertise, contact Kate_Hobbie@infoworld.com.
======================================================================
UNSUBSCRIBE/MANAGE NEWSLETTERS
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=17ABBB9:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
Contact Customer Service at: customerservice@infoworld.com
To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=17ABBBB:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107
This message was sent to: security.world@gmail.com
Do the Math, Save Money & Get A Better Running Computer
[ This message is being sent to you as a subscriber to
McAfee Dispatch. If you prefer not to receive future email
from McAfee, unsubscribe below. ]
============================================================
Do The Math
System Mechanic 7 (Secures + Optimizes + Repairs + Maintains)
= Peak Performance
------------------------------------------------------------
MCAFEE SPECIAL: Order System Mechanic 7 for only $29.95
(reg. $39.95). You save $10 thru Jun. 07, 2007.
Order here: http://us.mcafee.com/root/campaign.asp?cid=32515
============================================================
Features
System Mechanic 7 includes many features designed to simply and
quickly repair, maintain and optimize PCs. The following features
have been added or enhanced:
o One-click Power Tools make essential repairs and optimizations
based on your computer's needs
o A Problem Task List shows you the problems detected by System
Mechanic and lets you decide which ones you want to fix
o ActiveCare monitors your computer's performance, and then
automatically runs any needed repairs on-the-spot
o Intellistatus a feature that provides you with real-time
system information for performance tracking and troubleshooting
o An intuitive interface designed for quick access and use in
mind
o SafetyNet feature makes it easy to revert system changes
o System Mechanic Odometer shows you statistics of all the
repairs and optimizations made by System Mechanic
Important: Your Operating System must be designed and tested
to support English languages.
o PC running Microsoft(c) Windows(c) 98, Me, 2000, XP, or Vista*
o CD or DVD drive (for CD installation)
o 256 MB of RAM
o 25 MB of available hard disk space
o Internet Explorer 6.0 or later
* Compatibility contingent on public release of operating system.
Sincerely,
McAfee, Inc.
------------------------------------------------------------
[ You are currently subscribed as: security.world@gmail.com ]
Add dispatch@mcafee.com to your address book to ensure we
reach your inbox.
For support-related questions, visit:
==> http://www.mcafeehelp.com
For advice on computer security, visit:
==> http://us.mcafee.com/root/identitytheft.asp?cid=27213
Legal Note: This software does not guarantee protection
against all possible threats.
Unsubscribe:
==> http://dispatch.mcafee.com/us/unsub.asp
View our privacy policy:
==> http://us.mcafee.com/root/campaign.asp?cid=8207
McAfee is a registered trademark or trademark of McAfee,
Inc. and/or its affiliates in the US and/or other countries.
All other registered and unregistered trademarks herein are
the sole property of their respective owners.
3965 Freedom Circle, Santa Clara, CA 95054 (408) 992-8599
(c)2007, McAfee, Inc. All Rights Reserved.
ITIL V3 goes live; Nearly 30% of businesses not ready for a disaster
Network/Systems Management News AlertThis newsletter is sponsored by Nevis NetworksNetwork World's Network/Systems Management News Alert, 05/31/07ITIL V3 goes live, 05/30/07: The keepers of the IT Infrastructure Library Wednesday made available a refresh of the ITIL best practice framework, which industry watchers, vendors and IT executives anticipate will provide adopters with more how-to guidance. Click here for more. Teleworkers continue to multiply, 05/30/07: The virtual workplace is becoming a reality. A recent Nemertes Research survey of 120 IT executives found that 62% plan to increase the number of their branch-office locations. The research firm says branch offices will grow 11% in 2007, up 8.9% from 2006. Survey respondents also said close to 20% of their employees telecommute. And respondents said that some 80% of companies are virtual workplaces, which means some of the employees work at a different location than their supervisors or workgroups. Click here for more. Brocade unveils file management software, Fibre Channel enhancements, 05/30/07: Brocade on Tuesday launched wide-area file services and storage virtualization products intended to consolidate and manage remote office data. The company also announced new capabilities for its hardware-based Fibre Channel switches and directors. Click here for more.
Survey: Nearly 30% of businesses not ready for a disaster, 05/30/07: According to AT&T’s annual business continuity and disaster recovery preparedness study, 72% of IT organizations have plans in place in case of a natural or manmade catastrophe. Click here for more. Network/Systems Management Newsletter: BMC updates products with IT operations in mind, 05/30/07: A few years back management software maker BMC started its journey toward automated IT service management with the introduction of its business services management (BSM) strategy. Click here for more. BMC picks up ProactiveNet, 05/29/07: BMC Software today said it acquired privately-held software maker ProactiveNet for an undisclosed amount. Click here for more. |
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: Senior Editor Denise Dubie covers network and systems management for Network World. This newsletter is sponsored by Nevis NetworksBONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
F-Secure hit with antivirus vulnerabilities; Don't trust Google Toolbar; 'Spam king' arrested
Security News AlertThis newsletter is sponsored by SymantecNetwork World's Security News Alert, 05/31/07F-Secure hit with antivirus vulnerabilities, 05/30/07: F-Secure has patched several vulnerabilities in its security products, the most critical of which could be used to run unauthorized software on a victim's computer. Click here for more. Researcher: Don't trust Google Toolbar, 05/30/07: Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday. Click here for more. 'Spam king' arrested in Seattle, 05/30/07: A Seattle man was arrested Wednesday morning for illegal spamming activities. Click here for more.
Google digs in against malware with acquisition, 05/30/07: Google's acquisition of security company GreenBorder Technologies is a sign the search giant wants to bolster confidence in its browser-delivered applications amid growing threats from malicious software on the Internet. Click here for more. Survey: Nearly 30% of businesses not ready for a disaster, 05/30/07: According to AT&T’s annual business continuity and disaster recovery preparedness study, 72% of IT organizations have plans in place in case of a natural or manmade catastrophe. Click here for more. Has the image spam flood dried up?, 05/29/07: According to new spam stats from McAfee, the amount of aggravating spam sent as embedded e-mail images plunged recently. Click here for more. Samba vulnerability affects Mac OS X, 05/30/07: Symantec on Tuesday warned Mac OS X users in an advisory that one of the open source technologies included in the operating system was vulnerable to an attack. The flaw only affects users that have turned on Windows Sharing -- it is off by default on Mac OS X. Click here for more. Cell phones to warn of earthquakes in Japan, 05/30/07: Cell phones in Japan could soon provide a vital warning seconds ahead of a major earthquake. Click here for more. |
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen. This newsletter is sponsored by SymantecBONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
How much stuff can you put in a router?
Product Test and Buyer's GuideThis newsletter is sponsored by NokiaProduct Test and Buyer's Guide, 05/31/07By Christine BurnsLast week Adtran announced it is adding Layer 3 switching, Wi-Fi support and faster processing to its line of multi-service access routers. Adtran’s new NetVanta 1335 models – which the company says will eventually phase out its NetVanta 1224 models – will range in price from $1600 (the current base price of the NetVanta 1224) to $2800 depending on the number of wireless features and Power Over Ethernet features they support. The new boxes can be outfitted with dual Wi-Fi radios for both 802.11a and 802.11b/g wireless connectivity and can be configured to act as eight virtual access points. The new NetVanta 1335 routers also have faster processors, boosting throughput over the existing NetVanta 1224 routers from 24K to 45Kbps. The new devices include 24 Ethernet ports and two Gigabit Ethernet ports that can be equipped with PoE to support VoIP phones. Network World Senior Editor Tim Greene in his article about this Interop announcement noted that Adtran makes much of its enterprise switching and routing gear -- right down to its management interfaces -- to compete directly against Cisco products.
Tap into Network World’s Access Router Buyer’s Guide to see how Adtran’s products stack up against similar models from Cisco as well as other competitors like ImageStream and Vyatta. |
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: This newsletter is sponsored by NokiaBONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
IBM lays off over 1,500; IBM raises bar in Unix market
IBM News AlertThis newsletter is sponsored by IBM Complimentary Trial: IBM Software Development Tools Network World's IBM News Alert, 05/31/07IBM lays off 1,500, mostly in services, 05/30/07: IBM Wednesday laid off 1,573 employees, as part of a continuing overhaul of its services unit, the company said.
Servers Newsletter: IBM raises bar in Unix market, 05/29/07: While Unix may not be growing as fast as other segments of the market, it accounts for nearly a third of all server shipments. In its latest Quarterly Server Tracker, IDC says that Unix revenue grew just 0.5% in the first quarter of 2007, compared to the same quarter a year ago, but it also noted that Unix sales reached $4 billion for the quarter, a good chunk of the $12.4 billion in overall server sales. |
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: Contact Site Editor Jeff Caruso at jcaruso@nww.com. This newsletter is sponsored by IBM Complimentary Trial: IBM Software Development Tools BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
Making a profound business case for new technologies
Unified CommunicationsThis newsletter is sponsored by MicrosoftNetwork World's Unified Communications Newsletter, 05/31/07Making a profound business case for new technologiesBy Michael OstermanLast October, I was involved in a client’s advisory board meeting in New York and sat next to a senior manager from a large, U.S.-based company. That company’s senior management, concerned about the potential breach of sensitive data resulting from the loss of company laptop computers, issued an edict that all laptops had to be secured within a period of two months. Any laptop that was lost after that time and that was not equipped with appropriate encryption software would result in the immediate firing of the employee who lost it. That’s a good example of a profound business case for technology: implement it or risk getting fired. However, there are a variety of messaging technologies for which such a profound business case is a tougher sell. For example, in talking with someone the other day from a leading provider of enterprise instant messaging (EIM) systems, that individual related that they are seeing a somewhat soft market for EIM and presence, softer than what many people might have anticipated a few years ago.
Part of the issue is that many IT departments and business units have not yet found a really compelling reason to implement EIM and presence technologies, perhaps because they just don’t see enough business benefit from them relative to the other technologies they are faced with implementing. For example, a messaging decision-maker is faced with perhaps 15 different initiatives, technologies, etc. and must prioritize among them. If decision-makers in an organization have to solve problems around image-spam, phishing, spyware, archiving, policy creation and enforcement, outbound content filtering, e-discovery, etc., they will be less likely to consider the benefits of EIM and presence simply because these technologies are too far down the list to be addressed in the near term. The key for vendors, then, is to move EIM and presence up the list through the marketing of a clear business case for these technologies. We are currently conducting a survey of prospective EIM and presence customers in North America and will have some results to share on this topic in the next couple of weeks.
|
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: For webinars or research on messaging, or to join the Osterman Research market research survey panel, go here. Osterman Research helps organizations understand the markets for messaging and directory related offerings. To e-mail Michael, click here. This newsletter is sponsored by MicrosoftARCHIVEArchive of the Unified Communications Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
Freedom of speech and its consequences
Security StrategiesThis newsletter is sponsored by SymantecNetwork World's Security Strategies Newsletter, 05/31/07Freedom of speech and its consequencesBy M. E. KabayIn my last column, I introduced the case of AutoAdmit, where the owners allowed graphic racist and sexist lies to be posted at will on a site claiming to be devoted to the interests of law students. I began that article by explaining that some of my undergraduate students have trouble understanding that what they post in cyberspace may have unintended consequences later in their lives. In March, Ellen Nakashima of the Washington Post published a blistering analysis of the personal consequences to specific individuals of the libel published on AutoAdmit. Brilliant, talented women law students were denied jobs at top law firms; suspicions fell on vile postings on that board which feature derisive statements about women and other minority groups, "disparage individuals by name or other personally identifying information… [and] included false claims about sexual activity and diseases." The author pointed out that such postings eventually get indexed by search engines such as Google and are available to potential employers during their due diligence background checks. Unfortunately, some of these firms decline to risk embarrassment and therefore decline to hire the defamed law students.
One of the principals in the AutoAdmit case published a fascinating rebuke to an organization called Reputation Defender in which he refused to help remove defamatory materials about named individuals because he objected to the way in which he was approached. Readers can gain a clear understanding of that person’s values and concern for the victims of his board’s policies by reading his self-defense. In May, Wall Street Journal Law Blog writer Amir Efrati reported that the other AutoAdmit principal had been refused continued employment at a prestigious law firm. The attorney who refused further employment wrote, “We expect any lawyer affiliated with our firm, when presented with the kind of language exhibited on the message board, to reject it and to disavow any affiliation with it. You, instead, facilitated the expression and publication of such language… [and your resignation from the site was] too late to ameliorate our concerns.” I think that the people who ran this board had no sense of responsibility for the damage they were potentially causing to real human beings when they allowed lies and threats to remain on their discussion board. It’s easy to focus on abstractions and misinterpretations of the First Amendment and to lose sight of simple human empathy and bonds of social relations when everything is carried out impersonally in cyberspace. For more on that topic, see my paper “Totem and Taboo in Cyberspace: Integrating Technology into our Moral Universe” in HTML or PDF. So, students, learn the lesson well: Speech may be free, but disregard for the consequences of our actions does not always go unpunished.
|
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. This newsletter is sponsored by SymantecARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
Robots: More than meets the eye
Cool Tools AlertKeith Shaw's Cool Tools Alert, 05/31/07* LATEST COOL TOOLS VIDEOS: Robots: More than meets the eye * LATEST COOL TOOLS COLUMNS:
Turn your iPod into a digital recorder * FROM THE NETWORK WORLD VIDEO LIBRARY: Interop 2007 video notebook * LATEST TWISTED PAIR PODCAST: Twisted Pair Podcast: Interop 2007: No lonely cowboys here |
TODAY'S MOST-READ STORIES: 1. Novell publishes terms of Microsoft Linux deal MOST E-MAILED STORY: |
Contact the author: Keith Shaw is an award-winning editor at Network World. In addition to creating the Cool Tools universe of columns, blogs and videocasts, he also edits the weekly DEMOletter newsletter and is the Programming Director at Network World, responsible for the multimedia strategy for the Web site. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |