Wednesday, June 30, 2010

8 amazing things you'll do with Windows 8

Cisco tablet not an iPad knock-off: Chambers | Verizon iPhone coming in January

Network World Daily News PM

Forward this to a Friend >>>


8 amazing things you'll do with Windows 8
Windows 8 is still a couple of years away, but Microsoft is already telling partners what to expect in the next generation operating system. Luckily for the public, Microsoft planning documents shared with HP and other OEM partners were leaked this week, providing a wholly unexpected Windows 8 sneak preview. Read More


WHITE PAPER: Aerohive

Deploying a Secure WLAN
This paper walks through the steps to build a highly-secure wireless LAN and explains the technical considerations for: • Wireless privacy • Authentication • Client management and NAC • Network firewall and intrusion detection and protection • Identity-based access control • Rogue detection and WIDS • Compliance Read more!

WEBCAST: Nimsoft

Learn the benefits of software as a service
Software as a service has many benefits: lower hardware and admin costs, and a more secure, reliable and available environment. But SaaS adopters cannot afford to trade functionality for ease of management. In this webcast you will learn how Nimsoft On Demand delivers IT Infrastructure monitoring as a service – without compromise. View Now

Cisco tablet not an iPad knock-off: Chambers
Cisco's new Cius tablet for business collaboration will remain a workplace tool and not morph into a consumer-market competitor to the iPad or Kindle, company CEO John Chambers told a press roundtable at Cisco Live here this week. Read More

Verizon iPhone coming in January
The long wait for Verizon users to get their hands on the Apple iPhone could be over early next year, according to a Bloomberg report. Read More

Heartland ramps up first end-to-end encryption
Heartland Payment Systems, the victim last year of a massive data breach of sensitive card data, vowed after that devastating event to develop new security gear based on end-to-end encryption between itself and its merchants to prevent such a breach from occurring again. That's now taking shape, but slowly. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Cisco's TRILL drill: FabricPath beats IETF standard to market
Cisco this week expanded its data center arsenal with software, switches, modules and services all designed to scale the infrastructure to meet the demanding needs of virtualization, application complexity and cloud computing. Read More

News podcast: Network World 360
Cisco's new Cius tablet for business collaboration will remain a workplace tool and not morph into a consumer-market competitor to the iPad or Kindle, company CEO John Chambers told a press roundtable at Cisco Live in Las Vegas. Also, a California law firm may be looking to build a class action lawsuit against Apple over the iPhone 4's network reception issues, now known online as the iPhone 4 death grip. (4:30) Read More

Products of the week
Our round-up of intriguing new products from WatchGuard, Brocade, Silver Peak, among others. Read More


WHITE PAPER: NetApp

Discovering Improved Data Protection Strategies
This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context. It outlines the factors you should consider as you evaluate and implement data protection solutions in your virtual environment. Learn more.

Cisco energy management can now span enterprise
Cisco Systems on Tuesday announced the Cisco Network Building Mediator Manager 6300, a platform to manage all the systems in an enterprise that consume energy, across all the organization's facilities. Read More

Open source as business model or engineering convenience?
Every good engineer knows that design precedes re-use. First, you start with a good software design; then, whatever code you are writing has to be as generic as possible so it can be reusable. Engineers often do this by looking at different pieces of code that were written earlier.Open source is a wonderful way of doing this on a much larger scale. Read More

Is Microsoft's U-Prove The Answer To Better Online Privacy?
Microsoft's identity management tokens, known as U-Prove, are worth a real look -- and a pat on the back. We want to be able to securely make transactions without allowing a website to track us or to combine various pieces of information which enable that site to learn more about us than we care to share with it. Read More

Cisco's new WAAS 4.2: Breakthrough innovations or just fixing bugs?
I have been asked many times for my thoughts on the new release of Cisco WAAS 4.2. I have held off writing about this until now, after I had a chance to read over the release notes, talk to people and watch some videos on the subject. You won't be surprised to learn that I don't fully share Cisco views on the new release, but it was good marketing. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Quiz: Do you know IT security?
  2. Super software secrets
  3. Beyond the petaflop: DARPA wants quintillion-speed computers
  4. iOS 4's hidden features
  5. Apple 4 opening day: Not all is iPhone-tastic
  6. VMware's Maritz: OSes are having their jobs stolen
  7. Report: Users find yellow discoloration on iPhone 4 screens
  8. How HTML5 will change the Web
  9. Google Voice: 10 reasons to check it out
  10. iPhone vs. Droid vs. BlackBerry

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment