Monday, September 13, 2010

Are your tweets costing you a new job?

Is your cell phone a router? | HP buying ArcSight for $1.5 billion

Network World Daily News AM

Forward this to a Friend >>>


Are your tweets costing you a new job?
Half of IT workers would consider modifying content on a social media site if they knew a prospective employer was going to check it out, reports Technisource. Read More


WHITE PAPER: Pareto Networks

The Cloud-based Telework Solution
By combining a cloud-based model with user-friendly devices, Pareto Networks has pioneered a new approach to remote access with the simplicity, centralized control, visibility, and economies of scale needed for broad deployment to permanent telewokers. Read now!

WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

Is your cell phone a router?
While the current generation of "smartphones" is emerging with amazing capabilities, many of these capabilities can also lead to serious security implications. Let's take as an example of this capability the emergence of the feature available on phones like the Droid X to use your cell phone as a router. Read More

HP buying ArcSight for $1.5 billion
Hewlett-Packard announced Monday that it has agreed to purchase security vendor ArcSight for US$1.5 billion. The deal is expected to close by the end of the year. Read More

802.11n Wi-Fi making huge impact 1 year after standard ratified
A year after the IEEE 802.11n standard was ratified, the high-octane Wi-Fi is reshaping the wireless experience for users, and for enterprise IT. Read More

Anti-US hacker takes credit for 'Here you have' worm
A hacker who claims he was behind a fast-spreading e-mail worm that crippled corporate networks last week said that the worm was designed, in part, as a propaganda tool. Read More

VoIP and compliance regulations make strange and difficult bedfellows
As attacks against VoIP persist businesses not only have to defend themselves, they have to do it under the gun of regulators who want proof that security was addressed in accordance with their ever-changing rules. Read More


WHITE PAPER: Shoretel

Build a RFP for UC
Measuring TCO is the best metric for determining the risks and benefits of any technology. This white paper provides guidance on how to effectively measure the TCO for a Unified Communications system and will provide the details you need to build a comprehensive RFP. Read More!

Novell looks to solve private cloud vendor lock-in
With its Cloud Manager software released on Monday, Novell hopes to address the vendor lock-in problem facing enterprises building private clouds. Read More

Buzzblog: Newspaper demonstrates iPad 'fatal flaw'
The video needs only 30 seconds to make its point. And while the gist may seem telegraphed to some, the conclusion got my attention instantly. Read More

Some good news on budgets, career development
Our Network World State of the Network Study gives a fascinating view into where you stand on everything from budget availability to thoughts on the stature of networking and plans for a range of technology options. Read More

Cisco CEO Chambers' pay climbs 33% to $18.9 million
Cisco CEO John Chambers received compensation valued at $18.9 million in fiscal 2010, compared to $14.2 million in 2009. Read More

802.11n Wi-Fi essentials for enterprise IT
The rapid adoption of IEEE 802.11n as the Wi-Fi standard is transforming the wireless experience for users, and the enterprise network. Here's a round up of the news, issues, trends, and information you can use for keeping up with the fast-changing Wi-Fi world. Read More


WEBCAST: Meraki

Why Enterprise WiFi Belongs in the Cloud
Effective management is key to wireless success. Join this live Webcast to hear how cloud-controlled wireless management provides the security, remote administration and reliability resource-constrained IT departments require. See real-world examples of organizations that have successfully deployed enterprise WiFi in the cloud. Sign up now!

So, how does your dog food taste, Microsoft?
I can't tell you how many times people at Silicon Valley companies have told me they eat their own dog food, meaning they use their own technology to run their business. One exception was the classy guy who said, "We drink our own Champagne." I trust that the only company where they don't eat their own dog food is Purina. Microsoft recently posted about how its Azure dog food tastes. Read More

Gang Uses Facebook to Rob Houses
Leaving the house this weekend? Telling all your Facebook buds about it? You might want to reconsider that. Read More

Should Cisco boldly go where it's gone before?
Should Cisco aim higher when making acquisitions? Should the company go boldly - or more boldly - into new markets and market adjacencies? Read More

WAN Transformation is a Huge Project
Building on last week's WAN Transformation blog, our WAN Transformation project grew out of our experience earlier this year with WAN acceleration. We realized that we still wanted WAN acceleration, but we really needed significantly more bandwidth to make it useful. Read More

Tier 1 for IPv4 != Tier 1 for IPv6
With the impending depletion of the global IPv4 address pool, Internet Service Providers are rapidly working on their IPv6 deployment plans. Organizations who are starting their IPv6 transition plans are asking their current ISPs about their IPv6 services. However, organizations that have chosen Tier 1 ISPs for their Internet connectivity may be surprised by these Tier 1 providers' upstream IPv6 connectivity. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

6 useful Wi-Fi tools for Windows
Free or cheap apps can help troubleshoot your wireless network, turn your laptop into a hot spot, and more.

IT personality types: 8 profiles in geekdom
Consider this your field guide to the flora and fauna of your work life: the eight classic personality types you'll find in virtually any reasonably sized IT department.

MOST-READ STORIES

  1. Rackspace pulls plug on Koran-burning church's Web site
  2. Cisco wireless controllers open to attack
  3. 'Here you have' e-mail worm spreads quickly
  4. Epic failures: 11 infamous software bugs
  5. IT personality types: 8 profiles in geekdom
  6. Microsoft plans double-sized Patch Tuesday next week
  7. The 22 best Android apps
  8. 10 businesses you can start from your smartphone
  9. U.K. government could drop Microsoft for Linux
  10. Linux desktop market share: Small no matter how you measure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment