Thursday, August 12, 2010

Everything you need to know about building solid, reliable networks

  'Dangerous' iPhone exploit code goes public | 10 of the world's funniest tech videos
 
  Network World Daily News AM

Forward this to a Friend >>>


Everything you need to know about building solid, reliable networks
This networking primer walks you through the fundamentals, from the right switches to the right network monitoring techniques. Read More


RESOURCE COMPLIMENTS OF: DEMO Conference Winner

Major advances in understanding emotions conveyed by voice
DEMO Conference $1M Media Prize winner- eXaudios MagInify decodes people's emotions in realtime as they speak. Watch their DEMO Spring 2010 product launch at http://www.demo.com/dswinner Click to continue

DOWNLOAD: BlackBerry

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Today!

'Dangerous' iPhone exploit code goes public
Minutes after Apple issued a security update, the maker of a 10-day-old jailbreak exploit released code that others could put to use hijacking iPhones, iPod Touches and iPads. Read More

10 of the world's funniest tech videos
The U.S. hasn't cornered the market on funny tech ads. This is one virtual world tour you won't want to miss. Read More

Microsoft's 30-day forecast: Stormy exploits expected
Microsoft is warning customers that a record number of just-patched bugs will probably be exploited in the next 30 days. Read More


WHITE PAPER: Blue Coat Systems

Delivering Faster Applications to Any User, Anywhere
This guide looks at the specific issues behind application performance problems and how to resolve them within a WAN Optimization environment. Read More

Group wants to protect privacy as electronic toll systems grow
Looking to head off privacy problems with the increased use of transponders in cars, particularly in Europe, a group of researchers is touting a cryptographic protocol that would protect the private information generated by the devices. Read More

Cisco misses on Q4 revenue
Cisco missed revenue expectations for its fourth fiscal quarter. Even though the company beat Wall Street earnings expectations by a penny a share, a 27% revenue hike fell short of the Street's forecasts of 28% growth. Read More

4G czar at Sprint backs WiMax 'singularly'
Don't ask Matt Carter, president of 4G at Sprint Nextel, about LTE, a competing wireless technology. He wants to focus on Sprint's use of WiMax for 4G wireless networks. Read More


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
A solid Active Directory (AD) bridge in your diverse IT environment allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords for improved security and productivity (and reduced complexity and cost). Read More

Do we need a Federal law for electronics recycling?
A move could be afoot to get the Federal government behind a national law that would standardize the way electronic equipment is disposed of and or recycled. Read More

Revisions to credit card security standard on the way
The Payment Card Industry Data Security Standard 2.0 will be out at the beginning of September. The standard governs how businesses must guard sensitive cardholder information on their networks. Read More

What Will Symantec Do Next With Verisign?
Symantec's acquisition of the Verisign security assets closed earlier this week. This frees Symantec to tell the world what it bought and what role the Verisign services play. Good thing. Symantec caught a lot of flack for buying a legacy SSL certificates business. Read More

Keep your network management rules current
Many organizations manage their network bandwidth by applying a set of network policies that limit the amount of bandwidth available to certain types of traffic. For example, limiting music downloads, instant messaging, and access to certain Web sites can improve network performance by limiting the amount of non-business traffic on an organization's network. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Google CEO Schmidt: No anonymity is the future of the Web
  2. Motorola sees opportunity in iPhone coming to Verizon
  3. Who has the better virtualization platform - VMware or Microsoft?
  4. Registry hack allows Windows XP SP2 patching
  5. Cisco execs in line for HP CEO slot?
  6. Supersize your WAN
  7. U.K. bank hit by massive fraud from ZeuS-based botnet
  8. BlackBerry Torch 9800: 10 things you didn't know about it
  9. Ted Stevens, Father of "Intertubes", said to die in plane crash
  10. Microsoft vs. VMware: Who's better at disaster recovery?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment