Search This Blog

Friday, March 26, 2010

Google, Microsoft, Netflix in talks to create list of IPv6 users

Is Cisco 'Too Big To Fail'? | Undergrads flock to computer science programs

Network World Daily News PM

Forward this to a Friend >>>


Google, Microsoft, Netflix in talks to create list of IPv6 users
Leading Web content providers -- including Google, Yahoo, Netflix and Microsoft -- are conducting early-stage conversations about creating a shared list of customers who can access their Web sites via IPv6, the long-anticipated upgrade to the Internet's main communications protocol. Read More


WHITE PAPER: Polycom

Top Five Benefits of Video Conferencing
From obvious benefits, like reduced travel costs, to a few less apparent advantages, see what Polycom customers, resellers and industry analysts are saying about the power of video conferencing. Read More

WHITE PAPER: 3Com

Building Mission-Critical Data Centers
The traditional three-tier model of access, aggregation and core switching has turned into an operational nightmare. However, an IRF (Intelligent Resilient Framework) based network can extend the control plane across multiple active switches, increasing resiliency and reducing complexity. Learn More.

Is Cisco 'Too Big To Fail'?
Is Cisco 'Too Big To Fail'? Companies come and go all the time, due to lots of factors. Economic, political, legislative, all reasons why a vendor is here today, and gone before close of business tomorrow. What impact would Cisco's failure have from a technology standpoint? Read More

Undergrads flock to computer science programs
For the second year in a row, computer science enrollments in the U.S. have increased, according to an annual study of enrollment trends, giving hope that the degree program is seeing a revival that's here to stay. Read More

10 must-have free Palm webOS apps
A smartphone is only as good as its apps. Here are 10 free ones to supercharge your shiny new Palm phone. Read More


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

Gartner: 10 mobile & wireless technologies that should be on your radar
Gartner is highlighting 10 mobile and wireless networking technologies – including new versions of Bluetooth and location-awareness -- it says will play a big role in business-to-employee and business-to-consumer interactions over the next couple of years. Read More

Can a user-created ad campaign save Palm?
The team of Palm enthusiasts at webOSroundup.com has launched a crowd-sourcing project that invites other Palmophiles to create their own video ads for Palm's innovative operating system and the phones that run it. Read More

What to make of the hacker who broke IE8 in two minutes
Some of you might have seen today's story by Gregg Keizer of our sister publication Computerworld headlined "Hacker busts IE8 on Windows 7 in two minutes" and may have asked the same question I asked. Two minutes? Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

Microsoft's New Embrace of Open Source Makes Sense
Microsoft seems to be spending a lot of time lately trying to convince the open source world it really means it no harm. And, just maybe, it's true. See, Microsoft is about making money. It's a business. When a business sees dollars being siphoned off by other sources, it begins to pay attention. A well-run business doesn't wait until it's lost the battle to co-opt the model picking away at it. Read More

Predictions on demand for iPad are astonishing
Even by Apple standards, the hype around the iPad is difficult to fathom (in part because I couldn't imagine laying out $600 for one). Read More

Will the iPad be Jailbroken at Launch?
iPhone hacker George Hotz claims he has developed a new untethered software jailbreak method for the iPhone and iPod Touch that may also work on the iPad. Hotz, also known online as Geohot, says in a recent blog post that his new unnamed jailbreak method is as simple to use as his previous iPhone software jailbreak, blackra1n. The new software will purportedly work on all currently jailbroken iPhone and iPod Touch models. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Predictions on demand for iPad are astonishing
  2. New malware overwrites software updaters
  3. IPhone, Safari, IE8, Firefox all fall on day one of Pwn20wn
  4. China's Great Firewall spreads overseas
  5. Netflix Wii streaming discs to arrive in mailboxes tomorrow
  6. Software tracks employee Facebook, Twitter activity
  7. Five technologies in the mainstream, thanks to Apple
  8. Only a few days left to snag your CCNP cert training materials
  9. 20 years for notorious TJX hacker Gonzalez
  10. Researchers sound alarm on Web app 'side channel' data leaks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: