Monday, August 09, 2010

Sexual harassment scandal: Where does HP go from here?

  Are new IETF switching, routing specs needed? | Microsoft vs. VMware: Who's better at disaster recovery?
 
  Network World Daily News AM

Forward this to a Friend >>>


Sexual harassment scandal: Where does HP go from here?
Departing HP CEO Mark Hurd managed to bring HP from the brink of collapse and restore respect for the HP brand in only five years. Forced to resign as a result of a sexual harassment scandal, Hurd takes with him his vision for the future of HP, leaving his successor to figure out how to put the pieces of the puzzle together and continue to build on the momentum Hurd has built. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Aerohive

Replace Controllers with Protocols
Learn how a controller-less approach to WLAN keeps costs linear and predictive regardless of network size or deployment type. This architecture provides the capital cost advantages of autonomous APs and the technical advantages of controller-based approaches. Learn more!

Are new IETF switching, routing specs needed?
Two high-profile specifications winding their way through the IETF promise to boost data center switching and service provider routing, but advances from Cisco and Juniper Networks raise questions about how much the specs are even needed. Read More

Microsoft vs. VMware: Who's better at disaster recovery?
Debate has broken out over whether Microsoft's Hyper-V meets enterprise disaster recovery requirements. Read More

Subway rider's Twitter pic helps cops nab flasher
Not even the lowly subway flasher can escape the scrutiny of citizen law enforcers wielding the increasingly powerful combination of cell phone cameras connected to social networking sites. Read More

Poor Mark Hurd: HP severance includes $12.2 million cash, $16 million in stock
Ousted CEO Mark Hurd is departing HP with a hefty severance package, including a $12.2 million cash payment and HP stock worth about $16 million, according to a report filed Friday with the U.S. Securities and Exchange Commission. Read More


WHITE PAPER: Insight

Examine Open Storage v. Proprietary Disk Systems
Download this whitepaper today and examine how Oracle's Sun Storage 7000 Unified Storage Systems offer a complete, open and integrated solution that: * Reduces time to deployment. * Lowers risk. * Simplifies storage deployment and management. Read now!

What do Mark Hurd and Tiger Woods have in common?
Ousted HP CEO Mark Hurd now shares an unfortunate bond with golfer Tiger Woods: high profile attorney Gloria Allred has represented women central to both men's recent public falls from grace. Read More

Apple's head of iPhone engineering out after 'Antennagate'
Mark Papermaster, Apple's senior vice president of engineering for the iPhone and iPod, is leaving the firm, according to reports by The New York Times. Read More

Microsoft probes new Windows kernel bug
Microsoft is investigating an unpatched vulnerability in Windows after an Israeli researcher revealed a bug in the operating system's kernel driver. Read More

Network admin Terry Childs gets 4-year sentence
A City of San Francisco administrator who refused to hand over administrative passwords to the city's network was sentenced to four years in state prison Friday. Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

Living with the knowledge that we're infected
Even as average enterprise security spending has risen over the years from 2% of the total IT budget to 10%, the percentage of compromised corporate machines has also climbed, now up to 7% to 9% by some estimates. Read More

Google's March Toward Social Networking
Google this week confirmed its acquisition of online entertainment company Slide. The purchase rehashed speculation that the search giant is interested in working its way into social media, possibly with a game-centered service called "Google Me." Read More

5 Cisco IOS Shortcuts
Lately I've been studying for my second attempt at the Voice CCIE Practical Lab. Something interesting that I've noticed is that I find myself deliberately using Cisco IOS shortcuts much more in my CCIE practice than I ever did in real life, obviously to help my speed on the lab. Read More

FCC filing offers bit of detail on mystery HP device
Details about a new portable device from Hewlett-Packard emerged on the U.S. Federal Communications Commission's Web site on Thursday, intensifying speculation about HP's plans for tablets and mobile devices. Read More

The current state of net neutrality is… who knows?
The past couple of days have seen several contradictory reports about the state of the Federal Communications Commission's push for network neutrality, all culminating yesterday when the FCC announced that it had called off closed-door net neutrality talks between major industry players such as AT&T, Comcast, Verizon and Google. Read More

If net neutrality dies, blame the comms junkies
Mark Gibbs ponders net neutrality, service agreements and consumer comms addiction. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Microsoft slates record-setting monster Patch Tuesday next week
  2. Cisco firewalls hit again by DoS condition
  3. More than 1 in 10 Mozilla bug finders turn down cash
  4. Android 2.2 on Motorola Droid: First impressions of Froyo
  5. Android 2.2: How to install Flash on Froyo
  6. Google Wave washes out
  7. Smartphones as credit cards: Possibly dangerous, definitely inevitable
  8. Wall Street wants these tech skills
  9. RIM BlackBerry Torch 9800: A visual tour
  10. Hackers find a new target in payroll processing

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment