Monday, October 12, 2009

Microsoft loses Sidekick users' personal data; 7 tools to ease your Windows 7 rollout; Google Voice in trouble

7 tools to ease your Windows 7 rollout; Google Voice in Trouble Over Blocked Rural Calls
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Citrix Systems
rule

Eight Criteria for Server Load Balancing
Today's load balancing solutions should address application performance and security. Read about the top eight criteria you should consider when choosing a server load balancer and how Citrix NetScaler meets those requirements.

Click here.

rule

Spotlight Story
Microsoft loses Sidekick users' personal data

Contacts, calendar entries, photographs and other personal information of Sidekick users has almost certainly been lost for good following a service disruption at Sidekick provider Danger, the Microsoft subsidiary said on Saturday. Read full story

Related News:

7 tools to ease your Windows 7 rollout
These utilities help you plan, ensure app compatibility and manage images.

Google Voice in Trouble Over Blocked Rural Calls
A group of lawmakers wants the FCC to investigate Google Voice over charges the service blocks calls to their rural constituents. Such calls are expensive to connect, but landline carriers are prohibited from blocking them.

Hackers exploit year's fourth PDF zero-day
Adobe has acknowledged that hackers are exploiting bugs in its Reader PDF viewer and Acrobat PDF maker to break into Windows-based PCs.

Google patches DoS vulnerabilities in Android
Researchers at the Open Source Computer Emergency Response Team disclosed two denial-of-service vulnerabilities in Google's Android 1.5 mobile phone platform, both of which have already been patched by the vendor.

U.S. house decommissions its last mainframe, saves $730,000
The U.S. House of Representatives has taken its last mainframe offline, signaling the end of a computing era in Washington, D.C.

Finding who is sending 'bad' IPv6 traffic
In the world of IPv4, every network operator and security person know how to identify the host which sends 'bad' IPv4 traffic. In this blog entry, bad means launching an attack or sending malovent traffic, or violating Acceptable Use Policy or being misconfigured.

'A Bear Ate My iPhone!'
The "geniuses" at the Apple Store in Vermont have probably run into all sorts of excuses for broken iPhones, but they just didn't believe Kris Rowley. "A bear ate my iPhone," she told them.

There's no such thing as a 'business cell phone'
JD Power announced today that the Apple's iPhone ranked No. 1 in customer satisfaction for "smartphones in business," beating out LG and BlackBerry.

A pet peeve: pedantic pet peeves
I enjoy a vigorously ranted pet peeve as much as the next professional pundit and have shared my share here over the years. However, I've never had much patience for the pedantic.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

EMA: Successfully Managing your Next-Gen Data Center
How well are your virtual servers performing? Get them in tip-top shape with the best practices shared in this Live Webcast on Thursday, October 15, 2009 at 2 PM EST/11 AM PT. Join Jim Frey of Enterprise Management Associates as he discusses how to identify root cause issues, quickly spot performance bottlenecks, improve IT service delivery and much more.
Register today.


Top to Bottom Performance Management Excellence at the City of Chicago
In this featured City of Chicago case study, learn how the City's performance management efforts leveraged BIRT Performance Scorecard to: Save $10 million by improving their management of Overtime through Performance Management, break down departmental silos by facilitating cross-communication and consolidating financial payment processes and unify the performance management efforts of 36 city departments. Attend this web seminar to receive a complimentary copy of the City of Chicago case study.
Click here to register today.

 

October 12, 2009

MOST-READ STORIES

  1. One by one, carriers succumb to Google Voice
  2. Compromised e-maill accounts exploited in fake shopping scam
  3. How dangerous could a hacked robot possibly be?
  4. Six everyday iPhone disasters and how to handle them
  5. Ex-Nortel CEO seeks $12 million from bankrupt company
  6. First Windows 8 details emerge
  7. 7 keys to the ultimate smartphone
  8. Harvard's robotic bees generate high-tech buzz
  9. Cisco extends security controls to 'dark Web'
  10. 15 genius algorithms that aren't boring

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment