Friday, March 19, 2010

Google patches Chrome days before hacking contest

Car Tech: Coolest New Systems on Four Wheels | Iron Geek Triathlon: The Video

Network World Daily News PM

Forward this to a Friend >>>


Google patches Chrome days before hacking contest
Google has patched 11 vulnerabilities in the Windows version of Chrome, including one that earned its finder the first $1,337 check from the company's new bug bounty program. Read More


WHITE PAPER: 3COM

Building Mission-Critical Data Centers
The traditional three-tier model of access, aggregation and core switching has turned into an operational nightmare. However, an IRF (Intelligent Resilient Framework) based network can extend the control plane across multiple active switches, increasing resiliency and reducing complexity. Learn More.

WEBCAST: HyTrust

8 Tips for Virtualization Under Control
Examine 8 tips that will show you how to virtualize more critical workloads with confidence. From security planning and policy management to automation and access controls, get expert advice on how to build a more secure virtual infrastructure to accelerate the virtualization of business-critical applications. Learn More!

Car Tech: Coolest New Systems on Four Wheels
Automakers big and small are building computer systems into their cars to make driving safer, smarter and greener. Read More

Iron Geek Triathlon: The Video
Yes, we went through with it. As part of the fun at South by Southwest Interactive 2010 in Austin, Texas, a bunch of us created the first annual "Iron Geek Triathlon", a series of three competitive events aimed at crowning the true geek champion. Watch on. Read More

Multicore requires OS rework, Windows architect advises
Windows architect Dave Probert sees doing away of the OS kernel altogether, in favor of the hypervisor. Read More


WHITE PAPER: Double-Take Software

Virtualization and Disaster Recovery
The need to protect virtualized systems is paramount but organizations may not understand how vulnerable they are to disaster. This whitepaper discusses the challenges of protecting virtualized workloads and how Double-Take Software's solutions can help. Read Now.

Novell's Pulse enterprise 2.0 suite goes beta next week
Novell is ready to begin beta testing its Pulse enterprise social-networking and collaboration suite. Read More

News podcast: Network World 360
Palm CEO Jon Rubenstein said yesterday that if Palm's WebOS products had gone on sale at Verizon before Motorola's Droid, the company's fortunes today would be very different. Also, Vodafone said today malware-tainted memory cards may have ended up on as many as 3,000 HTC Magic phones, a greater number than first suspected. (2:12) Read More

Apple files mobile social networking patent request
A recently disclosed patent request suggests Apple may be working on a mobile social networking application that would presumably let iPhone users form ad-hoc groups based on their locations. Read More


WHITE PAPER: Arcsight

Combating Fraud & Data Theft
Discover scalable, minimally intrusive, log-based monitoring solutions optimized to the monitoring challenges unique to financial institutions. Learn More

Microsoft, Adobe confident there is room for Silverlight, Flash
Execs at OSBC speak of a symbiotic relationship between the HTML5 standard and their proprietary plug-ins for Web applications. Read More

A quarter of teens have tried hacking
A quarter of teens have attempted to hack into other people's online accounts, says Tufin Technologies. Read More

Is this the year the proprietary CMS dies?
To listen to folks at the South By Southwest Interactive Festival, the proprietary Content Management System is on its deathbed. And it may well be not too much of a stretch to believe that's the case. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Is this the year the proprietary CMS dies?
  2. Microsoft lowers Windows licensing costs for virtual desktops
  3. Top 12 tech knockoffs
  4. Windows XP: No IE9 for you
  5. Mobile developers take measure of Windows Phone 7
  6. Wireless router basics
  7. Comcast, ISC offer IPv6 transition tool
  8. New Cisco Ethernet switches to play a broader video, security roles
  9. Cisco defends its Borderless
  10. Doing the laptop drive of shame, Part III

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment