Monday, February 28, 2011

Smartphones spark IT security "mobile melee"

Top 10 Chrome OS extensions | Has Apple got white right for iPad 2?

Network World Daily News PM

Forward this to a Friend >>>


Smartphones, devices spark IT security "mobile melee"
While devices such as the iPhone, iPad, Blackberry and Android are in most cases welcomed into the corporate world, there's uncertainty about how to fit them into enterprise IT security practices that have been concerned so long by Microsoft Windows. Read More


WHITE PAPER: Riverbed

Improve Application Performance Management
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

Top 10 Chrome OS extensions
10 extensions that will improve your Chrome OS user experience Read More

Has Apple got white right for iPad 2?
New rumors say that Apple has got white right this time, and will unveil a white iPad 2 when the company announces the next version of its popular tablet, expected later this week. Read More

US House crimps consumer safety database money
Consumer safety database would provide mostly open information on tons of regularly consumed productsIn a move that reeks of party politics and lobbyist influence, the US House this week made moves to gut the funding of an online database that was to become a repository for consumer safety information three weeks before it was to debut. Read More


RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

Citrix invests in personal cloud management company
Citrix Systems has invested in Primadesk, a company that is developing a free, Web-based application to help users keep track of content stored in different cloud-based services, the company said on Monday. Read More

The Black Art of SLAs
wanIT buyers frequently tell us of their struggles to craft an SLA for their WAN and wireless service contracts. Among their key challenges are responsibility for identifying non-performance and remediation mechanisms. Read More

10 Ways to Goof Off at Work Without Getting Caught
Here's how to take a recreational break on company time--without the boss finding out. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Wisconsin Blizzard vs. Data Center: How Marquette Won
As blizzards raged across the Midwest in January, snow piled up on the data center roof at Marquette University and wreaked havoc with cooling systems. Here's how Microsoft's Lync unified communications tool helped IT fight back. Read More

Verizon iPhone suffers 'death grip,' says Consumer Reports
Consumer Reports today said that its lab tests show the Verizon iPhone 4 suffers from a "death grip" problem similar to last summer's revelations about AT&T's model. Read More

SeaMicro's new server has latest Intel Atom N570 chip
SeaMicro on Monday announced a low-power server that includes 256 of Intel's latest Atom N570 dual-core processors. Read More

Sprint includes 'smartphone tracker' app in new security software
Sprint debuted a host of smartphone security services as part of its Total Equipment Protection package. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. IT graduates not 'well-trained, ready-to-go'
  2. Playing around with tracking protection in IE9
  3. The 6 biggest misconceptions about IPv6
  4. Fake online 'girlfriend' bilks $200,000 from Illinois man
  5. How to turn Chrome into gold
  6. Canonical overrides Banshee team's decision
  7. Google scrambling to restore Gmail to 150,000 users
  8. 802.11u: Wireless 'superglue'?
  9. Pay no attention to that widget recording your every move
  10. Juniper leapfrogs Cisco with QFabric data center product blitz

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment