Search This Blog

Monday, May 10, 2010

IE9 sure is faster, but users have mixed reactions

FTC: Fraud more likely than brute crime at your local ATM | Q&A: Facebook users aren't outraged over privacy issues

Network World Security

Forward this to a Friend >>>


IE9 sure is faster, but users have mixed reactions
What more could be said about the new preview of IE9 released today? Apparently a lot. Twitter is probably the best way these days to take the pulse of user world on such commonly used items as browsers. I spent some time scanning through comments ... weeding out the ones that were merely retweeting a news stories and trying to get a sense for what folks think about IE9. Microsoft's browser marketshare... Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

FTC: Fraud more likely than brute crime at your local ATM
ATM fraud is more common and likely than crime committed directly against customers Read More

Q&A: Facebook users aren't outraged over privacy issues
Facebook executive Ethan Beard defended the firm's privacy policies, noting that users join the social network specifically to share personal information with others. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Unfortunate domain name attracts script-kiddies
Website defacements are nothing new, and are a rather trifling concern for security managers. They are low-hanging fruit, and the artworks of budding professional hackers and would-be penetration testers. Read More

Modern hack attacks are developing a laser focus
Threats to data security are changing in a dangerous way. They are becoming laser-focused on sensitive information such as intellectual property and cardholder data. Symantec has observed this shift over a period of years through its Global Intelligence Network. Read on to learn about the challenges this poses for most IT organizations. Read More


WHITE PAPER: HP

Quadruple VMs without Increasing NICs
IDC: As companies roll out blade-based virtualization deployments, many find that they have limited choices for network I/O. Virtual machines not only help bring more applications onto each server but also place additional demand on network I/O. Learn to adress these challenges. Read now.

Verizon and Novell team up on cloud security
Verizon and Novell have teamed up to deliver a cloud-based security solution Read More

Forensic tool will advance data recovery
New computer forensic tools will make it possible to recover more data from corrupted hard drives so long as the missing filles haven't been overwritten. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Hacker develops multi-platform rootkit for ATMs
  2. Wi-Fi key-cracking kits sold in China mean free Internet
  3. Sixth grader usurps software company
  4. Security firm reveals Microsoft's 'silent' patches
  5. IPv6 tunnel basics
  6. Apple-Adobe feud: Is Flash as bad as Jobs says?
  7. Feds shred counterfeit Cisco trade
  8. Is the Android truly open source?
  9. How many zettabytes can dance on a head of a pin?
  10. 10 hot energy projects that could electrify the world

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

blueshell said...

These community posts are nowhere near journalism... It looks like the back flip commercials, where there journalist is reporting news from facebook, and twitter feeds has reached the real world. Not as funny in real life.. quite lame actually.