Search This Blog

Wednesday, October 06, 2010

iPhone vs. Original Mac: A teardown showdown

Finding lost IT with RFID | Motorola shifts Wi-Fi smarts to access points

Network World Daily News AM

Forward this to a Friend >>>


iPhone vs. Original Mac: A teardown showdown
Frustrated with your smartphone's limitations? Oh, how far we've come. Here's how the iPhone 4 stacks up against the original desktop Mac. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: PC Mall

A Powerful Platform for Virtualization
Download this HP white paper to learn how the next-generation ProLiant servers can help companies achieve rapid ROI and dramatically lower their operational expenses. Read More

Finding lost IT with RFID
Vendors are trying to sell users on the idea that they need to stick RFID tags on IT equipment to keep track of it. Users are interested in this technology because they would much rather automate inventory tracking then go server-to-server with a bar code scanner and clipboard. Read More

Motorola shifts Wi-Fi smarts to access points
Motorola's new wireless LAN software offloads control tasks and traffic from the Wi-Fi controller to the access points. It's not the only vendor touting the benefits of such a change: more efficient networks, better performance and reliability. Read More

What? Padmasree Warrior is now CTO, SVP and GM at Cisco?
When Padmasree Warrior left Motorola back in 2007 to take the job of Chief Technology Officer at Cisco Systems, I had to laugh at blogger Brad Reese's characterization of her. He wrote, "Why on earth would John Chambers hire as Cisco CTO an individual who has been so badly beaten by Apple and Steve Jobs?" Now she is adding another title of Senior Vice President and General Manager. Read More


WHITE PAPER: Cisco

Cloud Security on IT's Terms
Outsourcing security has been controversial. There's simply too much at stake, some say, but new IDG research reveals the 51% of companies are either using or considering cloud-based security. This paper examines the top 3 myths of cloud security, email security in the cloud, as well as the importance of Data Loss Prevention. Read now!

'Political' cyberattacks hit half of large companies
When asked if their enterprises had been hit by "politically minded attacks" that could include terrorist or state-sponsored cyberattacks aimed at stealing sensitive inform or bringing down the network, half of the IT managers at 1,580 enterprises worldwide answered they thought that had happened to them. Read More

Microsoft IE browser share dips below 50%; Google Chrome rises
Microsoft's Internet Explorer, which has dominated the Web browser market since blowing by Netscape in the late 1990s, last month fell below the 50% market share level for the first time in years. Read More

Cursebird undergoes #&^@*^! makeover
Cursebird has provided a never-ending scroll of tweets that share nothing in common except for the fact that they include one or more - some a lot more -- of the words you can't say on TV. Charts aggregate how often the words are used by the Twitter crowd and track trends. Now, thanks to site upgrades unveiled last week, Cursebird has begun awarding points for bad behavior and featuring a leader board for those select few who see swearing as a competitive sport of sorts. Read More


WEBCAST: Cisco Ironport Systems

Is Cloud Email Security Right for You?
Many companies are shifting email applications and data into the cloud model—and yet not without concerns about security. To be sure, business-critical data must be protected. In this webcast, Cisco's senior manager for cloud security, Joel McFarland, addresses the concerns and offers strategies to take control of email security. Learn More

Gold in white space
The FCC's white space decision significantly increases the radio spectrum available for unlicensed computer communications. It could generate billions of dollars of business. Read More

Yahoo's data center chief draws lessons from century-old tech
Yahoo applied lessons learned a hundred years ago to its recently completed Lockport data center in New York, a decision that is saving it money and opening the door to future data center innovations. Read More

The mobile hotspot goes global
Verizon Wireless today launched its Fivespot mobile hotspot, which lets users connect to different types of 3G wireless networks and also provide Wi-Fi connections with up to five local devices. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. How Treasury, AT&T botched billion-dollar network upgrade
  2. BoA is holding my online bank accounts hostage
  3. Microsoft IE browser share dips below 50%; Google Chrome rises
  4. Can large scale NAT save IPv4?
  5. Free desktop tools that aren't OpenOffice
  6. 'Toasted skin syndrome' may be the least of their troubles
  7. The 17 most dangerous places on the Web
  8. BlackBerry backup encryption broken by Russians
  9. Toshiba's no-glasses 3D TV: How it looks
  10. Microsoft making 'first mover' Windows Phone 7 apps developers a priority

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: