Thursday, September 30, 2010

ZeuS trojan bank-theft scheme extends to the U.S.

Congress punts net neutrality back to FCC | Ig Nobel awards to honor world's wackiest researchers tonight

Network World Daily News PM

Forward this to a Friend >>>


ZeuS trojan bank-theft scheme extends to the U.S.
More than 60 people will be charged in the U.S. with using the Zeus trojan to steal millions of dollars from U.S. banks as part of a scheme that resulted in similar charges in the U.K. earlier this week. Read More


RESOURCE COMPLIMENTS OF: Cisco

Cisco Announces New Borderless Breakthroughs
Join us at 10 a.m. PT (1 p.m. ET) on October 5, 2010 for a live special event and be one of the first to preview the new solutions for Cisco Borderless Networks and Data Center/Virtualization architectures. See how these innovations can help you improve IT efficiency, business scalability and workforce effectiveness. Register now.

WHITE PAPER: Xerox

Selecting a Managed Print Services Vendor
This IDC paper offers guidance on the MPS market and key characteristics to consider when selecting a provider. Learn More.

Congress punts net neutrality back to FCC
Somewhat predictably, Congress has decided to not do anything about net neutrality. Read More

Ig Nobel awards to honor world's wackiest researchers tonight
The 20th annual Ig Nobel Prizes will be awarded for "achievements that first make people laugh, and then make them think." Read More


WHITE PAPER: St. Bernard Software

Secure Your Company: Free Web Filtering Offer
View an online demo that shows how you can enforce your AUP and protect your company with iPrism Web Filter, and you'll not only be eligible to receive a free year of web filtering, but you'll also receive a free TCO analysis report. Learn More

Viral Video: A DIY Guide
Want 15 minutes of fame? Try 90 seconds. Here are the essential components of a great viral video, regardless of length. Read More

iPhone 4 fails to slow Android demand for long
Apple's rollout of the iPhone 4 in June temporarily slowed down demand for Google Android smartphones, but a new study shows consumers are again very hungry for Android devices. Read More


WHITE PAPER: Citrix Solution Center NWW PAN IDG

Load Balancers are Dead
When looking at feature requirements in front of and between server tiers, too many organizations think only about load balancing. However, the era of load balancing is long past, and organizations will be better served to focus their attention on improving the delivery of applications. Read now!

Sprint leaders quit Clearwire board
Sprint Nextel CEO Dan Hesse and two other Sprint executives have resigned from the board of Clearwire "out of an abundance of caution" after Clearwire raised concerns about possible antitrust issues, Clearwire said Thursday. Read More

FAA pays out first $500M grants for commercial spaceports
The Federal Aviation Administration (FAA) took another step in bolstering the nascent commercial space industry by granting $500M to fund projects that develop and expand the infrastructure for outer space transportation. Read More

Defending Apple's use of 'magical'
Professional nitpickers such as yours truly have given Apple a hard time about describing the iPad - over and over and over again -- as "magical." Now professional illusionist Andrew Mayne has conjured up an interesting defense of Apple's practice. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Red Hat urges patent office to deny most software patents
  2. Many Android apps leak user privacy data
  3. Zeus botnet bank thieves were careless with own security
  4. Professionals: Don't use Facebook and Twitter
  5. Android software piracy rampant despite Google's efforts to curb
  6. Cisco eats its own IPv6 dog food
  7. How to make your cable company hate you
  8. Texting while driving bans don't work, study finds
  9. Fed's IPv6 plan called a "game changer"
  10. The shape of threats to come

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Educational Webcast - Ambushed by Facebook and Twitter?

Educational Webcast:
Ambushed by Facebook and Twitter?
 
         
Dear Security,
 
Attackers are no longer setting up malicious sites and hoping that victims will arrive. Build it and they will come makes little sense, when attackers can instead leverage successful, trusted web resources such as Google, Facebook and Twitter that receive millions of visitors each and every day. Traditional security controls such as Anti-Virus software or URL filtering are crippled in combating these new threats.
 
Join us for this educational Webcast with keynote by Chenxi Wang of Forrester Research who will address attacks that leverage trusted web resources.
Live Webcast: Keynote by Chenxi Wang of Forrester
Ambushed by Facebook and Twitter?
How attackers are using your trusted web resources to compromise your employees
Social Media Security: Why It Should Be On Everyone's Agenda – Chenxi Wang, Forrester
  • What are the specific security risks associated with Facebook and Twitter?
  • Why does traditional security fail to combat threats originating from Google, Facebook & Twitter?
  • Leveraging cross channel (web and email) threat intelligence for better security
Legitimate Web Resources are Catalysts for Attack – Michael Sutton, VP Security Research
  • How attackers abuse SEO to infiltrate results in Google, Bing and Yahoo!
  • Have Twitter and Facebook become unwilling pawns for attackers?
  • Can Google and Apple be effective gatekeepers to prevent malware on your IOS or Android based device or is this the future of malware?
Customer Case Study
For more information or to register click here.
Feel free to pass this invitation to your colleagues.
Any questions?  Send us an e-mail at:  webcast@zscaler.com
 
  Featured Speaker  
  Forrester  
Chenxi Wang, Principal Analyst, Forrester Research
Chenxi Wang
Principal Analyst
Forrester Research, Inc.

Date: October 5 & 7, 2010
Three convenient times for
  • USA, Canada, Latin America
  • Europe & Middle East
  • Asia Pacific

Click here to Register

 
     
Regards,  
The Zscaler Team
392 Potrero Avenue,
Sunnyvale, CA 94085, USA
Phone: +1-408-533-0288
www.zscaler.com
 
   

Note: Your e-mail is in our mailing list as security.world@gmail.com, if you wish to be removed from our mailing list please use the link below to unsubscribe from any future mailings. We will respect all unsubscribe requests Unsubscribe

Improve Performance with the Best Midrange Array

Server virtualization is making external storage a necessity. Ensure you make the right choice.

ITworld
Unsubscribe

One-Stop Research on Midrange Arrays

Make a timely and informed buying decision when searching for a suitable midrange array with this comprehensive buyer's guide. Midrange arrays are affordable, easy to deploy, reliable and offer a high level of performance. But not all midrange arrays fit every environment.

Learn More

Click here to read this buyer's guide now.

Thank you,
ITwhitepapers 



SUBSCRIPTION SERVICES

You are currently subscribed as security.world@gmail.com. If you do not wish to receive future mailings from ITwhitepapers' Resources, need to change your email or other preference, please visit: http://optouts.itwhitepapers.com/index.html?dept_id=44&emid=pyKllpH2BklbiwYMiAs0tyXjVZiIkK3IkTINkLYjHcM%3d

If the above URL is not enabled as a link, please copy it in to your browser window to access our Subscription Page.

View ITwhitepapers online privacy policy

Copyright 2010 | ITworld Inc. | 492 Old Connecticut Path | Framingham MA 01701 | www.itworld.com

Avaya, Skype in deal to offer low-cost, IP-based calling

White House issues IPv6 directive | Is your WAN ready for HD video?

Network World Network Optimization

Forward this to a Friend >>>


Avaya, Skype in deal to offer low-cost, IP-based calling
Avaya and Skype signed an agreement to offer Skype Connect to Avaya customers to help them lower international voice-calling costs through IP-based calls. Read More


WHITE PAPER: NetApp

A Case Study on Gateway Health Plan
Gateway Health Plan realized the need to make major changes in its storage environment to support business growth and customer demands. The primary objective was to improve the reliability of its production database environment to support customers during disasters. Read now!

WEBCAST: Palo Alto Networks

60 Minutes: The Future of the Perimeter
Join two pioneers in network security: Nir Zuk and Marcus Ranum, for what promises to be a very lively discussion on the future of the network perimeter. As applications and users move in and out of the enterprise network, what happens to the network perimeter as we know it? Does it go away? Evolve? How should organizations address these changes? Sign up now!

White House issues IPv6 directive
Federal CIO Vivek Kundra has issued a directive requiring all U.S. government agencies to upgrade their public-facing Web sites and services by Sept. 30, 2012, to support IPv6, the long-anticipated upgrade to the Internet's main communications protocol. Read More

Is your WAN ready for HD video?
Perhaps we have finally – after almost 50 years of talking about video – reached the point where it is indeed time for video to become a mainstream part of your network. Read More

HP replaces its Cisco core
Staying true to its word, HP this week said it has replaced Cisco and other "non-HP" networking gear with its own in all six of its worldwide internal data centers. Read More


WHITE PAPER: Fluke Networks

Detecting and Eliminating Intermittent Network Problems
Often, the only way to get to the root cause of unwelcome or intermittent events that occur on your network is to use a Network Recorder. In this white paper you will learn when it is important to use a Network Recorder, and key considerations when selecting a network recorder for back-in-time forensics analysis. Read now!

Survey says US public doesn't support Internet regulation
Fifty-seven percent of likely voters in the U.S. don't support any Internet regulation by the federal government, according to a new survey released by Broadband for America, an advocacy group with members including AT&T and Verizon Communications. Read More

Nimsoft delivers integrated monitoring for Vblock units
Not quite a year ago, Cisco, EMC and VMware joined together in a venture that integrated the respective vendor's Unified Computing System, storage and hypervisor into modular units called Vblock Infrastructure Packages. The goal, the trio said, was to accelerate deployment of virtualization and enable private cloud infrastructure. Read More

Cisco eats its own IPv6 dog food
Cisco has been selling IPv6-enabled routers, software and services for many years. Now, Cisco is taking the initiative to deploy IPv6 on its own public-facing Web site, the company confirmed Tuesday. Read More


WHITE PAPER: Alcatel-Lucent

Alcatel-Lucent 7750 Service Router
Looking for routers that offer the scalability to extend your reach with cost-effective, feature-rich platforms that consolidate and deliver the business, residential and mobile services your customers demand? For a limited time, introductory kits are available for the newest additions to the Alcatel-Lucent 7750 SR portfolio. Read Now

Positive ROI is what made WAN transformation possible
Our WAN transformation project aims to bring many new technologies and enhanced capabilities to users. But, before any of this could be done, the finances had to work out. Read More

Comcast: We will meet our IPv6 deadline
Comcast says it will meet its 2012 deadline of transitioning its network to support IPv6, the long anticipated upgrade to the Internet's main communications schedule. The ISP is halfway through a nine-month public trial of IPv6 that has attracted 7,000 of its business and residential customers nationwide. Read More

Dell names former Cisco exec to lead networking
Dell has hired Cisco Systems veteran Dario Zamarian to lead its networking business, naming him as its first vice president dedicated to that division. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Texting while driving bans don't work, study finds
  2. Microsoft issues emergency patch for Windows Web bug
  3. Kindle owners rich, iPad owners young and male
  4. At long last, Obama highlights IPv6 issue
  5. Cisco eats its own IPv6 dog food
  6. Crypto wars: EFF urges us to stand up and defend privacy
  7. HP replaces its Cisco core
  8. Fed's IPv6 plan called a "game changer"
  9. Google is world's most attractive employer; Microsoft drops to No.7
  10. Cisco expects BlackBerry PlayBook tablet to do well

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Many Android apps leak user privacy data

MIT researchers tout network intrusion recovery system | IE users most at risk from DLL hijacking attacks

Network World Security

Forward this to a Friend >>>


Many Android apps leak user privacy data
Researchers have created Android-based code that tracks what applications on a smartphone actually do with the data they have access to. They do a lot, it turns out, and most of what they do is unknown to the enduser Read More


WHITE PAPER: NetApp

Storage for Windows Environments
This paper discusses how consolidating your Microsoft SQL Server, Exchange, and SharePoint Server data along with your Windows files using NetApp storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments. Read More!

WHITE PAPER: NetApp

Get Storage Efficiency and Data Protection
This paper will show how NetApp storage efficiency and data protection features allow for a higher level of protection without compromise on risk or cost. Read now!

MIT researchers tout network intrusion recovery system
MIT researchers say RETRO will make recovery from system hacks easierMIT Computer Science and Artificial Intelligence Laboratory researchers will next week detail a system they say will make it easier for companies to recover from nasty security intrusions. Read More

IE users most at risk from DLL hijacking attacks
Users of Microsoft's Internet Explorer are more vulnerable to rogue DLL attacks than people who use rival browsers such as Mozilla's Firefox or Google's Chrome, a security researcher said today. Read More

How to secure a new PC
The excitement of discovering the capabilities of a new PC can lead you to forget the importance of security. Our new PC safety guide offers step-by-step instructions for protecting your machine. Read More


WHITE PAPER: NetApp

Read More!
ESG Whitepaper talking about Windows Data Consolidation in Mid-Sized Virtual Server Environments. This paper focuses on the challenges of virtualizing Windows environments and the need to consider network storage as a part of the overall solution. NetApp and VMware's joint solution is also examined in detail. Read now!

Worlds collide: Apple iPhone app manages mainframe
IPhone, iPad apps manage IBM mainframe systemsTalk about two systems that are worlds apart. Network management vendor William Data Systems says it has created an Apple iPhone app that lets users manage IBM's z/OS mainframe environment. What's up with encryption? Read More

The shape of threats to come
Mark Gibbs ponders the uber malware called Stuxnet. Read More

ZeuS botnet has a new use: Stealing bank access codes via SMS
The latest criminal activity linked to the ZeuS botnet is a software package tailored to BlackBerry and Symbian mobile phones and that picks off SMS messages, apparently to break the two-factor authentication that mobile bank customers use to access their accounts, researchers says. Read More


WHITE PAPER: IBM

Protecting Sensitive Data in Non-Production Environments
The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These techniques must produce results that accurately mask context-sensitive data and include a way to propagate masked data elements consistently across applications and operating environments. Read now

Microsoft Strengthens Security for Hotmail
Microsoft is tackling the growing issue of Hotmail account hijacking. Microsoft has introduced new security controls designed to help users better protect Hotmail passwords and recover compromised accounts more easily. Read More

Android software piracy rampant despite Google's efforts to curb
Pirating Android apps is a long-standing problem. But it seems to be getting worse, even as Google begins to respond much more aggressively. The dilemma: protecting developers' investments, and revenue stream, while keeping an open platform. Read More

Why CIOs are Resetting Information Security Priorities
Business partners with shoddy information security. Cloud computing vendors with dubious risk controls. What's a CIO to do? Our annual Global Information Security Survey tracks the trends. Read More

Crypto Wars: EFF Urges Us To Stand Up and Defend Privacy
Privacy watchdogs are growling as the Feds plan government-mandated back doors in encryption software and all communications systems. The "war on privacy" reached a new level as the EFF proclaimed it's time for all of us who care about privacy to stand up and defend it. The disturbing news today is that the government intends to expand its ability to surveill us by putting government-mandated back doors in all communications systems and in all encryption software. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Texting while driving bans don't work, study finds
  2. Microsoft issues emergency patch for Windows Web bug
  3. Kindle owners rich, iPad owners young and male
  4. At long last, Obama highlights IPv6 issue
  5. Cisco eats its own IPv6 dog food
  6. Crypto wars: EFF urges us to stand up and defend privacy
  7. HP replaces its Cisco core
  8. Fed's IPv6 plan called a "game changer"
  9. Google is world's most attractive employer; Microsoft drops to No.7
  10. Cisco expects BlackBerry PlayBook tablet to do well

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Zeus botnet bank thieves were careless with own security

15 Essential Games of This Generation | $1M of IT debt below the waterline of every big app

Network World Daily News AM

Forward this to a Friend >>>


Zeus botnet bank thieves were careless with own security
Suspects charged with stealing more than $9.4 million from U.K. banks using the Zeus botnet apparently spent more time figuring out the logistics of stealing the money than they did on securing their cyber operation. Read More


RESOURCE COMPLIMENTS OF: Aerohive

Free Wi-Fi Planning Tool from Aerohive.
With Aerohive's FREE web-based planning tool, you can plan a Wi-Fi deployment in no time! Upload your floor plan, draw the perimeter and walls using different wall types, and place any of a variety of different Aerohive APs either yourself or with our new auto placement feature to ensure the coverage level you specify. Click to continue

RESOURCE COMPLIMENTS OF: Cisco

Participate in the Cisco 3D Borderless Challenge Oct. 5-8
Test your IT knowledge in the Cisco 3D Borderless Challenge for a chance to win a trip to a wonder of the world, as well as one of the hundred Flip cameras being awarded. Click to continue

15 Essential Games of This Generation
Here are this generation's must-have games for the PS3, Xbox 360, Wii, and PC. Read More

$1M of IT debt below the waterline of every big app
If you get antsy wondering about the implications of ignoring those last-minute fixes when rolling out a big application, now you have ROI ammo to justify going back in for a final polish. Read More

Astronomers discover planet that could support life
NASA, NSF-funded research spots planet that could sustain lifeAstronomers have found a planet, or exoplanet 20 light years away and up to four times the mass of Earth that could sustain life. Read More

Comcast: We will meet our IPv6 deadline
Comcast says it will meet its 2012 deadline of transitioning its network to support IPv6, the long anticipated upgrade to the Internet's main communications schedule. The ISP is halfway through a nine-month public trial of IPv6 that has attracted 7,000 of its business and residential customers nationwide. Read More


WEBCAST: NetApp

Use 50% Less Storage - Guaranteed
Listen to this on-demand Webcast and hear Chris Rima of Tucson Electric Power discuss how his organization managed data growth and improved performance with storage and server virtualization. You'll also hear Brian Garrett from ESG and NetApp experts discuss ways to consolidate your Windows® application data, files, and virtual machines. Learn More

Intel will not position the Atom for server markets
Intel will not position its Atom processor for the server market, even as some vendors are building servers around collections of hundreds of low-power Atom processors, a company executive said. Read More

Red Hat urges Patent Office to deny most software patents
Red Hat's legal team has found a silver lining in the Supreme Court's Bilski decision, and wants the USPTO to use it. Read More

Worlds collide: Apple iPhone app manages mainframe
IPhone, iPad apps manage IBM mainframe systemsTalk about two systems that are worlds apart. Network management vendor William Data Systems says it has created an Apple iPhone app that lets users manage IBM's z/OS mainframe environment. What's up with encryption? Read More

Unable to tweet, Bill Gates starts a Chinese microblog
What does the world's wealthiest man do when he can't tweet? For Bill Gates, a trip to China this week has meant a jump to a Chinese micro-blogging platform. Read More


WHITE PAPER: NetApp

Get Storage Efficiency and Data Protection
This paper will show how NetApp storage efficiency and data protection features allow for a higher level of protection without compromise on risk or cost. Read now!

Will IBM/Blade Networks Hurt Juniper?
With Blade Networks in hand, IBM would now package Blade Networks and IBM blade servers together to counter Cisco UCS systems featuring integrated networking and compute. While this wouldn't kill Juniper, it would limit Juniper and others to the remaining laggards that want to buy seperate networking and server boxes. Read More

Android texting app requires no hands
A free Android application to be unveiled on Thursday at the Mobilize conference in San Francisco will let mobile phone users send and receive text messages without touching or looking at the phone. Read More

Home TelePresence coming from Cisco?
The blogosphere is alive with speculation that Cisco next week will unveil a home version of its TelePresence virtual conferencing system for $200 to $500. Read More

How To Make Your Cable Company Hate You
I cancelled my cable TV subscription three months ago. My Time Warner bill had been rising steadily--$1.50 here, $2.75 there--at regular intervals. When it reached $85 a month, I'd had enough. I cancelled my cable service, vowing never to return. The 24-hour shopping networks, cricket matches in Bangalore, colon-cleansing infomercials--I wouldn't miss any of it. Read More

Tech employment steady, latest Census figures show
While total U.S. employment dropped by almost 6 million people from 2008 to 2009, jobs in the computer/mathematics sector remained almost constant, according to figures released Tuesday by the U.S. Census Bureau. Read More

Personal robotics to top $19 billion in 2017
The personal robotics market will grow to more than $19 billion in 2017, driven in large part by sales of telepresence and security robots featuring high-quality cameras, microphones and processors that allow the robots to serve as interactive substitutes for human beings. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Texting while driving bans don't work, study finds
  2. Microsoft issues emergency patch for Windows Web bug
  3. Kindle owners rich, iPad owners young and male
  4. At long last, Obama highlights IPv6 issue
  5. Cisco eats its own IPv6 dog food
  6. Crypto wars: EFF urges us to stand up and defend privacy
  7. HP replaces its Cisco core
  8. Fed's IPv6 plan called a "game changer"
  9. Google is world's most attractive employer; Microsoft drops to No.7
  10. Cisco expects BlackBerry PlayBook tablet to do well

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **