Monday, April 12, 2010

The importance of user-friendly technology

Hacker conference to address emerging Web threats | Steganography discovery could help data thieves, but also improve radar, sonograms

Network World Security: Identity Management

Forward this to a Friend >>>


The importance of user-friendly technology
It's been a mantra that pops up in this newsletter periodically, and has for many years. Just a couple of weeks ago I phrased it as, "We have the technology, but the bureaucracy still gets in the way." Another way I'm fond of stating it is "the technology is easy, it's the people that's hard." But my old friend Chris Zannetos (he's CEO of Courion) has another opinion. I respect Chris' views, and they deserve to be presented to you. Here's what he told me. Read More


WHITE PAPER: Cisco Systems Inc.

The Full Story on WAAS Cost Saving Benefits
Wide Area Application Services (WAAS) can deliver a very favorable ROI within 11 months says Forrester Consulting in this informative report. WAAS lets you effectively choose how to deploy applications, store data and provision infrastructure services between branch and data center locations. Learn More

WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Hacker conference to address emerging Web threats
The Black Hat security conference will kick off next week in Barcelona, with training sessions and briefings from some of the most talented security researchers in the industry. Read More

Steganography discovery could help data thieves, but also improve radar, sonograms
There's a potential new form of steganography -- the sending of messages in ways that leave no hint the messages even exists -- that could lead to corporate data loss via CDs. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

Frustrations with cloud computing mount
Cloud computing is seeing a shift in focus among its users from what it offers to what it lacks. What it offers is clear, such as the ability to rapidly scale and provision, but what it is missing seems to be growing by the day. Read More

NASA: What's next?
More focus on  satellite exploration, climate change studies of Earth and developing new heavy lift rocket technology are but a few of the programs outlined by NASA chief Charles Bolden as this week he looked to spell out specifics about where Read More


WHITE PAPER: Citrix Systems

Minimize Datacenter Costs with Server Offload
This technical guide helps you learn how to reduce your server costs up to 60%. You'll gain valuable information on how Citrix NetScaler helps reduce datacetner costs with server and infrastructure offload. Read More!

Interop Planning Guide: Cloudy forecast
The 2010 Interop Planning Guide Read More

Batten Down the Hatches for Microsoft and Adobe Patches
Next Tuesday is both Microsoft's Patch Tuesday for April, and Adobe's quarterly patch release. Combined, there are a total of 27 vulnerabilities being patched in Microsoft Windows, Microsoft Office, Adobe Acrobat, and the Acrobat Reader application. It will be a busy day for IT administrators and information security professionals to analyze and prioritize the deluge of updates. Read More

Facebook ignores paedophile reports, says police
More than 200 complaints regarding suspected paedophiles and incidents of cyberbullying on Facebook have been to the police in the last three months. Read More

New healthcare IT compliance service protects electronic medical records
The healthcare industry has the highest mobile intensity of all industries. According to Forrester Research, 89 percent of healthcare businesses are highly mobile. Unfortunately, Forrester also reports that 31 percent of these businesses had an instance of data loss in 2009. As a result, 63 percent rank "understanding the risks and vulnerabilities" as the top challenge when it comes to mobile devices. Now there is a new cloud-based IT compliance service that aims to mitigate the risks and reduce the vulnerabilities that are specific to healthcare businesses. Get a free trial of the service and see if it's right for your business. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Mystery solved: Why time stands still at 9:42 on iPhone
  2. Apple surprises with iPhone OS 4.0 business features
  3. What iPhone OS 4.0 means for the iPad
  4. A Chinese ISP momentarily hijacks the Internet
  5. Canonical's newest Linux operating system to be released April 29
  6. Microsoft slates 25-patch Windows update for next week
  7. The oddest places to find Linux
  8. Juniper bets $100 million on Cisco's "killer app"
  9. 1-in-10 Windows PCs still vulnerable to Conficker worm
  10. 15 techie wristwatches worth watching

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment