Search This Blog

Tuesday, May 10, 2011

Native intelligence: Awareness and humor

25 ways IT will morph in the next 25 years | What kind of cloud computing environment do you get for $6M?

Network World Security Strategies

Forward this to a Friend >>>


Native intelligence: Awareness and humor
Recently I asked long-time friend and colleague K Rudolph, CISSP, chief inspiration officer at Native Intelligence some questions about her work. Read More


WHITE PAPER: Coyote Point

Advanced ADCs Take Over Where Load Balancers Leave Off
Server load balancers offer fairly basic capabilities. This white paper details the advanced content switching, application acceleration and VMware integration capabilities that have data centers using Equalizer Application Delivery Controllers to take over where server load balancers left off. Read More

WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

25 ways IT will morph in the next 25 years
Imagine a world where the computers, networks and storage systems are all tens of thousands of times faster than they are today -- and then think about the sci-fi type of applications that will be possible. Read More

What kind of cloud computing environment do you get for $6M?
The US Air Force said today it would spend $6 million to set up a state-of-the-art cloud computing research center at the University of Illinois.  The Air Force's Assured Cloud Computing (ACC) Center, will focus on developing technology to ensure mission critical data can get through the cloud securely and sometimes in the face of a cyberattack or other interference. Read More


WHITE PAPER: F5 Networks

Implementing DNSSEC to mitigate financial and brand risks
The problems of DNS security have long been known, which is why DNSSEC was developed. However, it is only now that widespread deployment is possible as the internet infrastructure is being readied to accept DNSSEC lookups and tools are available to remove the complexity involved in its deployment. Read now!

25 tech touchstones of the past 25 years
Read More

Cisco and NSS Labs still arguing firewall vulnerability test results
NSS Labs today is expected to say four out of five vendors -- Palo Alto Networks, Juniper, Fortinet and SonicWall -- whose firewall equipment it said was vulnerable to a hacker exploit have corrected the problem. The fifth, Cisco, maintains its ASA firewall isn't susceptible to the exploit known as the "TCP Split Handshake," which lets an attacker remotely fool the firewall into thinking an IP connection is a trusted one behind the firewall. Read More


WHITE PAPER: Quest

Diving Deep into Your Application Components
Determining application health doesn't end at the server level. This chapter explains how top-level, application-wide monitoring allows you to eliminate cross-department finger pointing and fix the source of the problem. Read now!

Security pros launch cybersecurity index
The index will track the overall sentiment of a group of cybersecurity experts to offer a measure of cyber risk. Read More

Phishing Becomes More Sophisticated
Highly targeted phishing emails have become the preferred method for illegally breaking into corporate networks. Read More

IT caught in crossfire when it comes to smartphone privacy
The news that iPhones, iPads and Android devices secretly track the locations of their owners poses a potentially serious dilemma for IT staffs. If someone's manager asks IT to retrieve that data and hand it over, what should IT do? We certainly have to acknowledge that a device that's used for business purposes but automatically tracks personal information blurs the line between personal and corporate information. Read More

Living legends of networking
Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Fave raves: 22 IT pros name their favorite products
We asked, and IT pros answered. Their favorite IT products keep people productive and enterprise assets safe. Check out the list.

MOST-READ STORIES

  1. iPhone 5 rumor roundup for week ending May 6
  2. So you think you know networking?
  3. Open minded: Re-inventing SuSE and three futures of Mono
  4. Cisco's 3 biggest weaknesses
  5. How to use an IPv6 hole to freeze a Windows Networks
  6. PC Porn: 8 awesome-looking components
  7. Note to John Chambers: Cut your marketing budget by 25%
  8. 25 ways IT will morph in the next 25 years
  9. Panel: The cloud requires fresh IT skills
  10. Cisco restructures, streamlines operations

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: