Friday, August 28, 2009

FBI investigating laptops sent to U.S. governors; Windows 7 user rollouts could come in pieces

News podcast: Network World 360; Windows 7 user rollouts could come in pieces
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Juniper Networks
rule

Dynamic Security in the Virtualized Data Center Network
Virtual data centers are creating new communications patterns within the network which cannot be secured by conventional, perimeter-oriented designs. Join Juniper Networks for a live Webcast on how to protect your data center's network, extend protection across new data flows, simplify management of policy rules and consolidate separate infrastructures.

Register now.

rule

Spotlight Story
FBI investigating laptops sent to U.S. governors

The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia Governor Joe Mahchin and Wyoming Governor Dave Freudenthal. Some state officials are worried that they may contain malicious software. Read full story

Related News:

News podcast: Network World 360
The federal agencies in charge of awarding broadband stimulus funds say that they've received roughly 2,200 applications for the $4 billion worth of grants available for broadband projects in the United States. Also, a Windows analyst says corporate users will more likely move to Windows 7 on a piecemeal basis as they replace PCs, rather than look for big budget outlays to cover a mass migration. (5:27)

Windows 7 user rollouts could come in pieces
Corporate users are more likely to move to Windows 7 on a piecemeal basis as they replace PCs rather than looking for big budget outlays to cover mass migration, says analyst Michael Cherry.

China game boss sniped rivals, took down Internet
An attack by a Chinese online game provider meant to cripple the servers of its rivals ballooned to cause an Internet outage in much of the country in May, according to police.

Security test prompts federal fraud alert
A sanctioned security test of a bank's computer systems had some unexpected consequences this week, leading the federal agency that oversees U.S. credit unions to issue a fraud alert.

Snow Leopard: Five Reasons to Upgrade Now
After a year of hype, Snow Leopard is finally here. But does it have claws? Apple's newest Mac OS has been billed as an under-the-hood upgrade-a necessary evolution of the operating system. But it's a little light on new features that Mac users can touch, see and feel (except, of course, for the mouse that responds to multiple finger gestures).

The Future is Now? Augmented Reality Comes to the iPhone
If you're traveling to Paris, France anytime soon, consider taking Metro Paris Subway 3.0 along for the trip. This 99-cent iPhone app integrates an augmented reality feature (called Your New Eye) that will show you where the closest Paris subway stations are, relative to your current location, as an overlay atop a live video feed from the iPhone's built-in camera.

It's Official - The iPhone is finally coming to China
After a number of false starts and roadblocks in neogitations, Apple finally struck a deal to bring the iPhone to China via China Unicom, the regions second largest mobile carrier behind China Mobile.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.


Independent Test Results: Citrix vs. F5
Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios.
Learn More

 

August 28, 2009

TOP STORIES | MOST DUGG STORIES

  1. High-tech blimps earning their wings
  2. The opposite of Twitter
  3. 5 techs that could reinvent cell phones
  4. 12 words you can never say in the office
  5. Wi-Fi encryption cracked in 60 seconds
  6. Cisco's fastest router just got faster
  7. Marines want lots of robots to throw
  8. Group attacks Windows 7's 'sins'
  9. Microsoft, Citrix no longer sponsoring VMworld
  10. Judge overturns 2007 Unix copyright decision

Examining Netcordia's NetMRI 3.0
Sick of the spreadsheet? Download this whitepaper today and examine Netcordia's NetMRI 3.0, a user-centric upgrade to its network change and configuration management (NCCM) solution. IT research firm Enterprise Management Associates reports that NetMRI 3.0 "propels NCCM practices to new levels."
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment