Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you. 57 Amazing Things You Didn't Know Your Tech Could Do! Do you often wish that the tech you own or use had superpowers, or that you could transform ordinary gear into something really great--possibly for free? With our amazing instructions, you can! 14 Great Things iPhones and BlackBerrys Can Do Gmail, Google Maps, and Google Search: 19 Cool Tips 6 Crazy Tricks for Digital Cameras and Photos 3 Tips for iTunes, iPods, Other Digital Music Players TiVo, Wii, and Xbox 360 Controllers: 8 Clever Tricks The new ground zero in Internet warfare When it comes to critical national infrastructure, the highly distributed and ultra-interconnected U.S. power grid is, hands down, the most vulnerable to cyberattack. On this one point, many cybersecurity experts seem to agree. Follow Network World on Twitter Senator questions White House control over cybersecurity The ranking member of the Senate's Homeland Security Committee, Susan Collins, (R-Maine), Tuesday raised questions about recent calls for a direct White House role in coordinating national cybersecurity affairs. Verizon pursues illegal autodialers Verizon Wireless said Tuesday it has settled a lawsuit against two companies that used autodialing to call its wireless customers to pitch extended auto warranties. It also announced a separate lawsuit to stop three other companies from similar acts. Benioff calls for 'the end of maintenance' Salesforce.com CEO Marc Benioff is well-known for brash pronouncements and on Tuesday delivered his latest, calling for "the end" of traditional software maintenance fees. New zero-day exploit targets Adobe Reader Adobe Systems Inc. Tuesday confirmed that it's investigating reports that its popular PDF viewing software, Adobe Reader, contains a critical vulnerability. Despite Obama's Web 2.0 efforts, e-user satisfaction slips Despite the Obama administration's efforts to update government web sites, satisfaction with them has fallen for the first time in a year, a survey of 280,000 users of government Web sites found. Identifying the source of corporate threats The Verizon Business RISK team recently released its "2009 Data Breach Investigations Report," which gives a fresh look into the question of whether insiders or outsiders are the larger threat group. The report concludes that 74% of breaches result from external sources and "the predominance of total records lost was attributed to outsiders." Cloud computing security: Who knew? Bradner: Security has not been much of a consideration in cloud computing --but that may be about to change. Cisco No. 4 of 20 most profitable techs Cisco Subnet reports that Cisco is No. 4 in a listing of the 20 most profitable companies in high-tech, according to Fortune. The company trails only Microsoft, IBM and HP, and is ahead of Oracle, Intel, Apple, Dell and several others. 100% trade-in credit for Nortel products Cisco Subnet blogger Brad Reese takes note of Enterasys' offer to Nortel customers: 100% trade-in credit for Nortel products. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. |
No comments:
Post a Comment