Thursday, May 20, 2010

Symantec to buy VeriSign's authentication business

The Android surge goes global | My makeshift 3G iPad

Network World Daily News AM

Forward this to a Friend >>>


Symantec to buy VeriSign's authentication business
Symantec will pay $1.28 billion to acquire VeriSign's security business. The two companies confirmed the rumored acquisition Wednesday, saying it would give VeriSign the opportunity to focus on its more-profitable domain name business, while allowing Symantec to broaden its growing portfolio of enterprise security products. Read More


WHITE PAPER: Extreme Networks

From Physical to Virtual to the Cloud
The migration from a dedicated infrastructure to a shared and outsourced cloud infrastructure is not a one-size-fits-all proposition. With Extreme Networks "Four Pillars" strategy, Enterprises and Hosting Centers of any scale can approach change in a logical and affordable, stepwise fashion. Read More

WHITE PAPER: Oracle

Oracle Accelerate - Not Just Smart But Timely
This video highlights the Oracle Accelerate program - a group of pre-configured, tested solutions that combine Oracle enterprise applications and rapid implementation tools with industry-specific bundles. The program reduces the time, complexity and cost of deploying Oracle and is implemented by highly trained partners. Learn More.

The Android surge goes global
The surge in Android phone adoption isn't just confined to the United States, research firm Gartner has found. Read More

My makeshift 3G iPad
Since getting the Wi-Fi only version of the Apple iPad, I've been using it in two main locations - at home and at work, which both have very good Wi-Fi connections and a higher-speed backhaul. That changes today, as I'm heading to New York for a quick trip, and I wanted to see how the experience would be away from those two safe confines. Read More

Microsoft Revamps Hotmail With New Tools
Microsoft is beefing up its Windows Live Hotmail with a bevy new productivity features for sharing and working. Read More


WEBCAST: Actuate

Solve Data Needs: BIRT Defined
This webcast will give you a primer on BIRT including the technology and the community. BIRT can help you overcome the challenge of delivering accurate and meaningful data to users while minimizing IT development efforts. Learn more today!

Nanotech will be focus for future criminal hackers
Criminal hackers once rejoiced in manipulating the new digital phone systems in the 1960s and 1970s; then they moved on to using modems and hacking into mainframes in the 1970s and 1980s; then they exploited the new local area network technology and the burgeoning Internet in the 1980s. Malware writers moved from boot-sector viruses on floppy disks in the 1980s to file-infector viruses and then to macro viruses in the 1990s and vigorously exploited worms and Trojans for botnets in the recent decade. So what's next on the horizon? Read More

LifeLock CEO said to be victim of identity theft 13 times
A CEO who publicly posted his Social Security number on billboards and TV commercials as part of a campaign to promote his company's credit monitoring services was the victim of identity theft at least 13 times, a news report says. Read More

Cisco, Extreme have strong Q1 switch sales
An improving economy, pent-up demand, and a reduction in backlog due to supply chain constraints have all led to first quarter growth in the Ethernet switch market. The market was up 12% in Q1 to $4.6 billion, according to Infonetics Research. This follows a 15% hike in the fourth quarter of 2009, and is up 41% from the first quarter of 2009. Read More


WHITE PAPER: Polycom

Hosted VoIP. What Does That Mean To My Business?
This informative guide, featuring questions from business people, provides answers and insights on how Hosted VoIP can impact communications by providing critical features and flexibility, all for significantly lower costs. Read More

Cloud Computing Comes to a (Linux) Desktop Near You
Peppermint OS is a "cloud-oriented" OS, meaning it's designed to boot and run from the cloud (buzzword alert). Apparently there have been over 25,000 downloads of Peppermint in its first week, so obviously there is some interest, even if it's "just" from the Linux community. Read More

WAN Ethernet / VPLS: Is overhead an issue?
We're in the midst of a most interesting conversation at Webtorials on the subject of "Wide Area Ethernet / VPLS - Ready for Prime Time?" This conversation features an in-depth online interview with Geoff Kreiling, Manager - Product Development, at Masergy. Read More

Motorola offers mobile device management
Motorola Inc. today announced two managed services to help companies with limited resources keep mobile devices and wireless LANs up and running. Read More

Aruba Networks reports record quarterly revenues
Wireless LAN vendor Aruba Networks reported another quarterly loss, slightly smaller than a year ago, but its third-quarter adjusted earnings were slightly better than analysts expected, and it set a record for revenues. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Black duck eggs and other secrets of Chinese hackers
  2. I could license you to use this software, but then I'd have to kill you
  3. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  4. USB worm named biggest PC threat
  5. VA disconnects Sprint's voice, data services
  6. Sun's stars: Where are they now?
  7. Cisco buys Moto -- no, not that Moto
  8. Facebook users warned of sexy 'Candid camera prank' attack
  9. EFF: Forget cookies, your browser has fingerprints
  10. Microsoft counters Gmail with Hotmail overhaul

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment