Search This Blog

Thursday, February 03, 2011

Google Chromebook: The good, the bad and the beta

Google bets $20K that Chrome can't be hacked | From cloud and mobile security to encryption, security concerns abound as RSA turns 20

Network World Daily News AM

Forward this to a Friend >>>


Google Chromebook: The good, the bad and the beta
When Google first started giving away the Cr-48 in early December, lots of reviewers posted their first impressions after driving the Chromebook around the block a couple of times. We've taken the Chromebook out on a two-month test drive to see how it performs in real-world conditions. Read More


WHITE PAPER: Riverbed

5 Key Principles to Redesign IT Infrastructure
Wide Area Data Services can bring the distributed enterprise closer together. Read this paper to learn the 5 key principles you can leverage to redesign an environment of any size and provide better support for distributed employees and improved business continuity during a disaster. Read now!

RESOURCE COMPLIMENTS OF: St. Bernard, now doing business as EdgeWave

Spend Less on Email Security, Earn $15 GC
Next-gen Email Security finds emerging email threats first, with our proprietary Zero Minute Defense TM- no one else has it. Protect your business-critical email and your network. We'll try to match the cost of your current solution, or any competitive offer you have. You'll earn cash just for checking us out. Click here for the EdgeWave Bid Desk.

Google bets $20K that Chrome can't be hacked
Google will pay $20,000 to the first researcher who successfully exploits its Chrome browser at this year's Pwn2Own hacking contest. Read More

From cloud and mobile security to encryption, security concerns abound as RSA turns 20
This marks the 20th year since the first RSA Conference, an annual meeting that has witnessed major technology shifts, aired significant controversies and undergone a name change on its way to becoming the largest security conference in the world. Read More

PC makers scramble in wake of Intel chip flaw revelation
Some PC makers are halting sales of PCs with Sandy Bridge processors as they try to work out issues related to Intel's faulty chipset, companies said on Wednesday. Read More

Cloud services could bolster national cyber security
The shift to cloud computing offers an opportunity to better secure the national digital infrastructure by concentrating the burden of cyber security among a relatively small number of service providers rather than thousands of individual businesses, according to a report by a foreign policy think tank. Read More


WEBCAST: Cisco & Citrix

Regain Control of the Desktop
Learn how one IT organization is realizing the benefits of Desktop Virtualization and find out what they did to ensure a successful deployment of VMware View 4.5. Learn More

If you could ask Vint Cerf anything, what would you ask?
In about two weeks, Vint Cerf and I will be sitting in a room at Colorado University in Boulder having a chat. What would you like me to ask him? Read More

Microsoft bolts HTML5 video onto Chrome for Windows 7 users
Microsoft has released an HTML5 video-player extension for the Chrome browser to counteract Google's decision to drop support for the most widely used HTML5 video format. Read More

How Verizon workers are like Charles Manson
These days both Verizon executives and California prison officials are fighting the same immutable law of human nature: When people want their phones, people want their phones. Read More

Google Spills the Details on Tablet OS, Honeycomb
The great tease is over: Today, here at its headquarters in Mountain View, Calif., Google showed off Android 3.0, a tablet-friendly operating system also known as Honeycomb. The new tablet-optimized OS emphasizes a slick interface, beefed up graphics for games, and support for in-app purchases. Read More


WHITE PAPER: LogMeIn

Install Software on 50 Computers in 5 Minutes
Routine maintenance can be anything but routine when the time it consumes for IT support is considered. Learn how to easily take care of software updates all at once, automate the installation of thousands of computers without going on site, and set up standard maintenance scripts into one, secure tool. Read now.

Net watchdogs, Apache side with Microsoft in patent dispute
The Electronic Frontier Foundation, Public Knowledge and the Apache Software Foundation -- siding with Microsoft in a long-running legal battle -- have joined forces in urging the United States Supreme Court to make it easier for juries to invalidate software patents. Read More

IT execs hope iPad, PlayBook can boost decision-making process
IT executives at Chevron and TD Bank are testing whether tablets like Apple's iPad and the upcoming BlackBerry PlayBook can be used to improve workflow processes int their companies. Read More

And you thought Facebook was for fun
Nothing quite takes the fun out of using social network sites such as Facebook and Foursquare as a little scientific research. Read More

Is Google's copying complaint fair or hypocritical?
When involved in a spat over allegations of unauthorized copying or misappropriation of content and ideas, Google -- fairly or not -- usually plays the villain, accused of parasitically overstepping boundaries to profit from someone else's work. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. No more IPv4 addresses
  2. Android topples Symbian as world's No.1 mobile OS
  3. Internet 'kill switch' bill reintroduced as Egypt remains dark
  4. How to protect Windows from the new MHTML zero-day hole
  5. As IPv4 disappears, transition poses hazards
  6. Microsoft warns of new Windows zero-day bug
  7. Anatomy of an Internet blackout
  8. Kaspersky vows anti-virus products are safe despite source-code theft
  9. IPv4 addresses: Going, going, g...
  10. What is an 'Advanced Persistent Threat,' anyway?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: