Friday, September 18, 2009

Google says Apple rejected Voice app; 10 space technologies grounded?; Cybersecurity coordinator to-do list

10 NASA space technologies that may never see the cosmos; The Cybersecurity Coordinator To-Do List
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Citrix Systems
rule

A Clear View Toward Virtualization
Virtualization has busted out of the data center and overspread the desktop and application worlds. Citrix has emerged as a major innovator in virtualization solutions. Click below to read an Executive Viewpoint featuring Citrix CEO Mark Templeton.

Download this Executive View Point now.

rule

Spotlight Story
Google says Apple rejected Google Voice App

If you thought the brouhaha over Google Voice on the iPhone had blown over, you'd better batten down the hatches: it's coming around for a second pass. In responding to the FCC, Apple said it was still considering the app, despite the contention by Google employees that Apple had already rejected it. Unfortunately, Google had redacted that portion of its letter to the FCC--until Friday, when it retracted that request. Read full story

Related News:

10 NASA space technologies that may never see the cosmos
NASA has robots, rockets, inflatable homes and lots of other advanced technology that may never lift off.

The Cybersecurity Coordinator To-Do List
Members of the security community are acutely aware that the Federal Cybersecurity Coordinator's job remains vacant. When this individual is finally appointed, he or she won't have much time to get up to speed. As a public service, ESG suggest that the cybersecurity coordinator prioritize the following 10 items.

Apple flubs its improved support for Exchange email security
Apple's improved support for Microsoft Exchange security triggers frustration for some enterprise users linking to Exchange 2007.

PC demand takes off ahead of Windows 7
People are snapping up new desktop and laptop PCs long before the launch of Windows 7, a sign of strong demand in the market, analysts say.

Google Chrome 3.0 Still Isn't Ready for Business
Let me get this out of the way: I have been a huge fan of Chrome since it came out last September. Yet despite the refinement that newly-launched Chrome 3.0 displays, it's still not quite ready to take center stage as the browser of choice for business. Although its performance and clean, intuitive interface make it a joy to use, its lack of mainstream support limits its usefulness in the office.

Sprint President Takes a Shot (Or Two) at AT&T 3G
A Sprint exec speaking here today used AT&T as the poster child for 3G wireless networks that can't keep up with the increasing data demands of smartphone users.

Sniffing Your Windows Server Network
In my Server 2008 class this week, a student ran into a situation where rebooting a domain controller seemed to take forever. (Sound familiar?) In a domain consisting of three, count 'em three, computers, it seemed ridiculous that the domain controller should require nearly 15 minutes to "prepare network connections." I was very curious to know what the heck was going on under the hood.

Burglar Checks Facebook During Raid, Gets Busted
"OMG LOLZ brkin into sum1s house!"

CCNA Difficulties, Part VI (and last): Simlets
Many people come to the CCNA game never having had an IT job. That's perfectly reasonable - many people work towards CCNA as a way to help get that first IT job, or even their first networking-focused IT job. Unfortunately, that lack of prior experience makes the Sim and Simlet questions that much harder for CCNA candidates.

Palm waves good-bye to Windows Mobile
Palm is cancelling its reliance on Windows Mobile, which it adopted some years ago in an effort to expand the market for its handheld devices.

The new word for tech's ex-employees is 'alum'
Thanks to the economic downturn, former employees of high-tech companies are staying in touch by joining alumni groups to find jobs, business opportunities and to socialize.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Increasing Energy Efficiency with x86 Servers
According to the Robert Francis Group, power efficiency will be the number one issue for IT executives for the next decade, at least. Fortunately, the combination of IBM BladeCenter Systems with the new Intel® XeonĂ’ 5500 Series processors provide the best combination of value, performance, and reliability.
Learn More


Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.

 

September 18, 2009

MOST-READ STORIES

  1. Microsoft's CodePlex Foundation has credibility issues already
  2. 10G Ethernet shakes net design to the core
  3. An amazing laptop recovery story
  4. Microsoft Internet Explorer SSL security hole lingers
  5. Skype Founders sue eBay: What's going on?
  6. 10 cool Web apps developed in two days
  7. 10 in IPv6 does not equal 10 in IPv4
  8. Nortel users should hope for best, prepare for worst
  9. Curious George's latest mischief: malware
  10. Cisco forms smart grid ecosystems

The Virtual Enterprise Requires a Network that is More Than Good Enough
This report provides an overview of how virtualization is transforming organizations, describes the role the network plays and provides some practical advice on how IT decision-makers should evaluate network solution partners to support virtual computing.
Click here to learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment