Tuesday, November 16, 2010

Google Chrome tops 'Dirty Dozen' vulnerable apps list

Top 15 Essential iPad Apps for Work | Microsoft Lync: What you need to know

Network World Daily News AM

Forward this to a Friend >>>


Google Chrome tops 'Dirty Dozen' vulnerable apps list
The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application on the "Dirty Dozen" list of 12 applications with the most discovered software flaws requiring security updates and notifications from January through mid-October. Read More


WHITE PAPER: Riverbed

An In-Depth Look at ROI
In this whitepaper, Riverbed discusses its compelling and powerful return on investment in hard dollars, and a way to leap past the obstacles preventing you from reaching your IT objectives. Read now!

WHITE PAPER: Riverbed

Making the Promise of Cloud a Reality
Whether a business builds out its own cloud or buys cloud services from someone else, they need to be sure the end results are optimized for the speed users require. This paper identifies where the limitations of cloud computing exist and provides actionable strategies to unleash cloud performance. Read now!

Top 15 Essential iPad Apps for Work
From Awesome Currency Calculator to iTranslate, here are 15 iPad apps that will help you do the job and make the process a bit more fun. Read More

Microsoft Lync: What you need to know
Microsoft this week will launch Lync, the latest version of its unified communications and collaboration platform that, like competitive products, promises to change the way businesses do business by integrating a range of existing communications and collaboration technologies. Read More

Facebook messaging throws a blow at Google
Facebook's new messaging system may not be a Gmail killer, but it's definitely another blow in the growing battle between two Internet bigwigs. Read More


WHITE PAPER: Riverbed

Accelerating the Cloud
To stay competitive and keep costs down, today's enterprises need to consolidate resources, quickly provision services, and more effectively rationalize costs with new business models. If done correctly, cloud computing can help solve these problems, and further help IT managers maintain business-critical applications and data. Learn More Now.

Voltaire ups ante in InfiniBand/Ethernet duel
The next-generation InfiniBand FDR standard competes with Ethernet for conveying high-throughput, low-latency traffic. Read More

Video shows lack of overheating protection in Windows Phone 7 HTC Surround
If you get a Windows Mobile Phone 7 hot enough, will it explode in your pocket? Concerns over a lack of a thermal protection shutdown in WP7 have surfaced thanks to a stunt video posted on YouTube. Read More

Cisco pops packetized optical system
Cisco this week unveiled a transport system for service provider networks that is designed to help them better support packet and IP-based services, like video, mobility and cloud computing. Read More


REPORT: APC by Schneider Electric

Inside the Energy-Efficient Data Center
The enterprise data centers long been an energy hog, But the situation is improving within many enterprise data centers as data center managers and the industry as a whole come to terms with how to boost IT efficiencies while improving power and cooling methodologies — all while keeping costs in check. Read Now.

Why concurrent logins to a Windows network are a (very) bad idea
A vast number of Microsoft's security holes are dependent on the credentials of the user logged in when a Windows machine is hacked. But one of Windows' weakest areas of baked-in security is login controls. Third-party software, such as IS Decisions' UserLock takes on the task of filling in the gaps. Read More

Penetration tests: 10 tips for a successful program
Why are you performing penetration tests? Whether you're using an internal team, outside experts or a combination of the two, are you simply satisfying regulatory or audit requirements, or do you actually expect to improve enterprise security? Read More

NTIA identifies federal spectrum for commercial broadband
The U.S. National Telecommunications and Information Administration (NTIA) has identified 115 MHz of wireless spectrum now controlled by the federal government that can be turned over or shared with commercial users for wireless broadband service, the agency said Monday. Read More

Windows Phone 7 Riddled with Rookie Mistakes
Borrowing the classic Marlon Brando line from the movie On the Waterfront, Microsoft "coulda been a contender." The problem is that Microsoft has made a number of mistakes and omissions with the highly-anticipated Windows Phone 7 platform that greatly handicap its potential success against rival platforms like iPhone and Android. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Traveler to TSA: If you touch my junk, I'll have you arrested
  2. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux
  3. Cisco apps for the iPhone and iPad
  4. Best networking tweaks for Windows Server, Vista and XP
  5. Inside an alleged iPad killer: the Samsung Galaxy Tab
  6. Researchers take down Koobface servers
  7. Ex-Apple 'grip of death' exec lands at Cisco
  8. Man loses $20 million after taking laptop for repair
  9. What's at the core of Cisco's plight?
  10. Russian Armenian botnet suspect raked in €100,00 a month

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment