Search This Blog

Wednesday, April 22, 2009

5 tools to prevent energy waste in the data center; EarthLink suffers Earth Day crash

Intel CPU cache poisoning: dangerously easy on Linux; RSA news; 10 keys for making social networking work
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Zenith Infotech
rule

Business Continuity with Zenith ARCA
The Zenith ARCA is an all-in-one business continuity appliance that offers robust features like disk to disk backups, standby server functionality, Exchange recovery tools, remote office replication and bare metal recovery.

rule

Spotlight Story

5 tools to prevent energy waste in the data center
By Jon Brodkin
Data centers are filled with power-hungry racks of storage and servers, but many products and services are capable of reducing the power usage of existing IT equipment. With Earth Day upon us, here are five tools to help data centers stop wasting energy. Read full story

Related News:

News podcast: Network World 360
The size and value of outsourcing deals has shrunk by about 20% so far this year, according to industry watchers, but the number of IT outsourcing contracts sustained a steady pace. Also, AT&T is doubling the capacity of its 3G high-speed packet access network to reach peak speeds of 3.6Mbps. (6:14)

EarthLink suffers Earth Day crash
EarthLink was hit with a major outage today, with EarthLink users unable to access their e-mail or any Web pages hosted by the company.

Intel CPU cache poisoning: dangerously easy on Linux
A researcher has created proof-of-concept exploit code on an ultra stealthy attack against Intel CPUs. One security expert explains the attack and why it is so potentially dangerous.

RSA's Coviello: Vendors must take a bite out of cybercrime
RSA president tells conference attendees core security functions need to be shared to give real-time risk assessment, response.
Related:
Slideshow: Intriguing new products from RSA
NAC can't get untracked
Cisco makes several new security announcements at RSA
Day Two RSA 09: Confessions of a Booth Troll
RSA: IBM delivers on Phantom promise

10 keys for making social networking work
One of the big challenges when you put any kind of content or service online is getting people to actually take a look - 'page views' are the 'eyeballs' of Web 2.0.

AT&T income down slightly in Q1
AT&T reported net income of $3.1 billion in the first quarter of 2009, a decrease of nearly 10% compared to the year-ago quarter.

Mozilla patches 12 Firefox bugs, a third of them critical
Mozilla Tuesday patched 12 security vulnerabilities in Firefox 3, just days before it hopes to roll out the newest beta of its next open-source browser, Firefox 3.5.

Recycle your tech gear: It's easier than you think
Downturn or no downturn, it's nice to upgrade your tech gadgets now and again, especially when they are so old that your colleagues are looking at you sideways. But once you've bought -- or been given -- that great new digital camera, or smartphone, or laptop, what do you do with the old one?

Performance tiers and testing needed for 802.11n
As noted last time, new types of potentially attractive, useful 802.11n products are set to emerge that the Wi-Fi Alliance is currently not equipped to test and certify.

Linden Lab will rate parts of Second Life adults only
Inhabitants of Second Life, the virtual world run by Linden Lab, will soon have new options to customize how they see the world. The first will be the ability to filter adult content, Linden Lab said on Wednesday.

Today on Google Subnet
Mark Murphy muses on the likely focus of the next Android Developer Challenge; Google adds Profiles to search in monopoly-like move; Android netbook has split personality; and Google Blogoscoped sees some worthy uses for Google’s new Analytics export API.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Zenith Infotech
rule

Business Continuity with Zenith ARCA
The Zenith ARCA is an all-in-one business continuity appliance that offers robust features like disk to disk backups, standby server functionality, Exchange recovery tools, remote office replication and bare metal recovery.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/22/09

Today's most-read stories:

  1. Six things that could ruin Twitter (and five that won't)
  2. 100 Gigabit Ethernet: Bridge to Terabit Ethernet
  3. Apple iPhoneys: The 4G edition
  4. VMware vows to overhaul data center with "cloud operating system"
  5. The FBI as an ethical hacker?
  6. The biggest loser in Oracle-Sun deal: SAP
  7. Why the Oracle/Sun deal is bad news for Microsoft and SQL Server
  8. AT&T expands its contact center portfolio
  9. OpenSolaris, Linux could merge under Oracle
  10. Microsoft could be a winner in Sun-Oracle deal
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: