Thursday, June 30, 2011

Traditional host-based anti-virus software losing luster?

Analysts lukewarm on HP Touchpad chances for success | Up Close with HP TouchPad

Network World Daily News PM

Forward this to a Friend >>>


Traditional host-based anti-virus software losing luster?
Traditional host-based anti-malware packages just aren't that useful anymore, according to some companies that find it either doesn't protect against the main dangers they face from the Web or it simply doesn't run well in virtualized computer environments. Read More


RESOURCE COMPLIMENTS OF: CIO Perspective

Empower Yourself at CIO Perspectives
CIO's Editor in Chief Maryfran Johnson and Suzanne Bates, author of "Discover Your Leadership Brand" discuss the experiences of IT leaders Steve Jobs and Sir Richard Branson. Learn what shaped their leadership styles and how to identify and leverage your own IT leadership brand. CIO Perspectives Boston – July 20, 2011. Click to continue

WHITE PAPER: EMC

The Mandate for Converged Infrastructure Management
Converged infrastructure is changing the way data centers roll out infrastructure resources and providing a clear and achievable path to cloud computing environments. Effective management of infrastructure is a key capability that can significantly impact the degree of success for data centers going the converged route. Read more

Analysts lukewarm on HP Touchpad chances for success
Analysts say HP has to do more to make the new TouchPad tablet a market winner. Read More

Up Close with HP TouchPad
At the Digital Experience event in New York, Keith Shaw chats with HP about its new TouchPad tablet, which uses the WebOS operating system. The $499 tablet ships on July 1, 2011. Read More

NYC mayor demands $600M refund on software project
New York Mayor Michael Bloomberg is demanding that systems integrator Science Applications International Corporation reimburse more than US$600 million it was paid in connection with the troubled CityTime software project, a long-running effort to overhaul the city's payroll system. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

Like Cisco, Like Juniper
Juniper's second quarter may lack some luster due to lower demand among service providers and enterprises, according to investment form UBS. UBS states in a quarterly preview bulletin that its "checks" show a product transition challenge in switching impacting enterprise demand, while routing is "likely to slow" following three very strong quarters. Read More

Most Popular Windows Phone 7 Apps
A choice selection of games, maps, office productivity and media apps for Microsoft's smartphone. Read More

Apathy, law enforcement complications keep cybercrime hopping
General public apathy and collaboration with the law enforcement community assure that cybercrimes of all sorts will continue to rise. Read More


WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Gartner upgrades worldwide IT spending forecast
Gartner on Thursday upgraded its forecast for worldwide IT spending, saying it will grow 7.1 percent this year to US$3.7 trillion as companies migrate to the cloud and spend more on software and IT services. Read More

Researcher: Threats from zero-day exploits overhyped
Computers lacking patches for long-known vulnerabilities potentially face more of a hacking risk than from zero-day exploits, or attacks targeting vulnerabilities that haven't been publicly disclosed, according to new research from Secunia. Read More

IBM announces computer memory breakthrough
IBM researchers have successfully stored multiple bits of data in the cells of phase-change memory chip. This will allow the creation of non-volatile memory with as much capacity as NAND flash but with vastly greater performance and longevity for enterprise-class applications. Read More

Has Business Intelligence Failed?
Is your business keeping up with the huge advances in predictive BI technologies that can help your company grow? Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Tablet deathmatch: HP TouchPad vs. Apple iPad2
  2. 10 compelling apps for Cisco Cius
  3. The best 2011 Windows 7 laptops for work and play
  4. Inventor of SecurID token has new authentication system
  5. IBM takes dim view of EU claims
  6. At $750, Cisco Cius Android tablet priced more than an iPad
  7. Apple offers refunds for unhappy Final Cut Pro X customers
  8. What Microsoft paid The Stones to help launch Windows 95
  9. 9 gigantic bonuses that make yours look like chump change
  10. Buying a Linux machine -- Where to shop?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Google+ could be Google's latest enterprise weapon

Startup opens videoconference bridging service | 9 gigantic bonuses that make yours look like chump change

Network World Network Optimization

Forward this to a Friend >>>


Google+ could be Google's latest enterprise weapon
Google's new social networking service just a day old, but analysts are already wondering how long it will be before Google+ is refocused for the enterprise. Read More


RESOURCE COMPLIMENTS OF: CIO 100

Empower Yourself at CIO 100
Bestselling Author and Executive Career Coach, Marshall Goldsmith, will share 11 specific actions that CIOs can take to bolster their careers and inspire their teams, fostering more positive workplace behavior, attitudes and greater productivity in the process. Join us August 14-16, 2011 - Register today!

WHITE PAPER: EMC

The Changing Role of Network Management
Read how new challenges in IT like virtualization and cloud computing are changing the role of Network Managers, who are now required to leverage automation and integrated solutions even further to adapt to these changes. Learn how EMC Ionix Network Solutions help Network Managers overcome these challenges. Read now

Startup opens videoconference bridging service
Startup Blue Jeans Network launches its videoconferencing bridge service, letting customers blend conferences over legacy systems as well as with video services such as Skype. Read More

9 gigantic bonuses that make yours look like chump change
Big bonuses are back. Nine tech CEOs received cash bonuses of $3 million or more in 2010, and another 13 netted at least $1 million in cash payouts. Read More

Carrier Ethernet: a welcome tonic for global business
In today's uncertain economic climate it takes courage to predict good news in any sector, but industry analysts such as Infonetics and Ovum are sticking to their predictions for strong growth in Carrier Ethernet services and equipment - a $20 billion market set to grow to between $40 billion to $50  billion by 2014. Impressive - but still just a ripple on the greater global economy. Read More


WHITE PAPER: Fluke Networks

Importance of Permanent Link Testing
This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. This technical paper provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links. Learn More Today!

How Random House overcame enterprise collaboration obstacles
With more than 10,000 new book titles and products launching every year, publishing company Random House needed a real-time solution to help manage and share information, and improve employee communication. Email, says VP of IT Chris Hyams Hart, just wasn't cutting it. Read More

Want an all-purpose tablet? Avoid Cisco and Avaya
With Cisco finally saying it will charge $750 for its Cius tablet, there's a lot of comparisons being made between it and the iPad, but those comparisons are misleading. Read More

Inventor of SecurID token has new authentication system
The inventor of the two-factor authentication SecurID token says the latest technology he's come up with is better because it can be used with a voiceprint biometric, plus it can be deployed for purposes of secure authentication in mobile phones, payments and cloud computing. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

4 steps to help your IT team when disaster strikes
CIOs who have been through disasters share ideas to help employees cope personally and professionally in a catastrophe, so they can help with business recovery. Read More

The network performance management challenge
There is no question that server virtualization can help organizations reduce costs while streamlining operations. I constantly hear stories about server provisioning going from weeks to hours now that it is as simple as spinning up a new VM. In theory, this will get even easier as IT develops applications on top of cloud platforms like Azure, AWS, and Google App Engine. Read More

IBM announces computer memory breakthrough
IBM researchers have successfully stored multiple bits of data in the cells of phase-change memory chip. This will allow the creation of non-volatile memory with as much capacity as NAND flash but with vastly greater performance and longevity for enterprise-class applications. Read More

Los Alamos shuts down supercomputers as fire advances
The Los Alamos National Lab has shut down two of its largest supercomputers, as wildfires continue to burn near this sprawling New Mexico facility. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Cisco's Cius tablet to ship next month
  2. Gigabit Wi-Fi spec edges closer to reality
  3. Facebook bans KDE application, deletes user photos
  4. Symantec finds big differences in iOS, Android security
  5. Volume of data darn near indescribable ... without the iPad
  6. Geekiest wedding dress ever
  7. Microsoft patent may ruin Skype
  8. Zillow's rewrite of real-estate history upsets some homeowners
  9. Microsoft launches Office 365, glosses over cloud limitations
  10. Apple warned of phishing attack threat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Real-time: A Business Imperative

Do not miss this one of a kind thought leadership forum.  Register now


ITworld  

ITworld
A panel discussion with industry thought leaders

The panel will discuss and present the need for this innovation for today's enterprises, adoption trends, benefits of the innovation and potential to transform IT to enable business success. Do not miss this one of a kind thought leadership forum.

Learn More

Forward this to a Friend >>

ITworld  
 

 
Learn how to make cloud an integral part of your enterprise storage and data protection strategy.


SUBSCRIPTION SERVICES
You are currently subscribed as security.world@gmail.com. If you do not wish to receive future mailings from ITworld Online Resources, need to change your email or other preference,
please visit us here.

View ITworld's online
privacy policy.

Copyright 2011 | ITworld | 492 Old Connecticut Path | Framingham MA 01701 | www.ITworld.com
 
 

Microsoft Researchers Find Spammers by Graphing Social Networks

Google patches 7 bugs in Chrome browser | Inventor of SecurID token has new authentication system

Network World Security

Forward this to a Friend >>>


Microsoft Researchers Find Spammers by Graphing Social Networks
Do you believe in the theory that only good people have lots of social media friends, while "bad people" don't have friends and don't leave many traces of themselves online? According to recent Microsoft Research, a spammer email account can be identified by the lack of connectivity to other people. Read More


WHITE PAPER: IBM

Managing Data and Application Security Risks
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit Read Now

WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Google patches 7 bugs in Chrome browser
Google patched seven vulnerabilities in Chrome on Tuesday as it issued the second security update for its browser this month. Read More

Inventor of SecurID token has new authentication system
The inventor of the two-factor authentication SecurID token says the latest technology he's come up with is better because it can be used with a voiceprint biometric, plus it can be deployed for purposes of secure authentication in mobile phones, payments and cloud computing. Read More


WHITE PAPER: Raritan

Introduction to Data Center Infrastructure Management
This paper looks at how DCIM products can help you streamline operations, automate asset management, optimize resources and reduce costs. Read More

OECD declaration on Internet policy angers EFF
The OECD on Wednesday issued a communication on developing Internet policy that appears to put pressure on Internet service providers (ISPs) to take responsibility for policing their networks. Read More

MasterCard blames ISP outage for site's downtime
MasterCard said on Wednesday that its main website was offline for a short period of time due to a weather-related issue at a third-party ISP and not a distributed denial-of-service (DDOS) attack as claimed by WikiLeaks. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

The Network Performance Management Challenge
There is no question that server virtualization can help organizations reduce costs while streamlining operations. I constantly here stories about server provisioning going from weeks to hours now that it is as simple as spinning up a new VM. In theory, this will get even easier as IT develops applications on top of cloud platforms like Azure, AWS, and Google App Engine while leaving all of the infrastructure... Read More

Better security needs 'more informed patching'
Security firm Secunia finds that the most popular three-dozen programs account for 80 percent of vulnerabilities. Better patching could help security, but not everyone agrees. Read More

9 gigantic bonuses that make yours look like chump change
Big bonuses are back. Nine tech CEOs received cash bonuses of $3 million or more in 2010, and another 13 netted at least $1 million in cash payouts. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Cisco's Cius tablet to ship next month
  2. Gigabit Wi-Fi spec edges closer to reality
  3. Facebook bans KDE application, deletes user photos
  4. Symantec finds big differences in iOS, Android security
  5. Volume of data darn near indescribable ... without the iPad
  6. Geekiest wedding dress ever
  7. Microsoft patent may ruin Skype
  8. Zillow's rewrite of real-estate history upsets some homeowners
  9. Microsoft launches Office 365, glosses over cloud limitations
  10. Apple warned of phishing attack threat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Microsoft uses social networks to find spammers

What Microsoft paid The Stones to help launch Windows 95 | Microsoft launches Office 365, glosses over cloud limitations

Network World Microsoft

Forward this to a Friend >>>


Microsoft researchers find spammers by graphing social networks
Do you believe in the theory that only good people have lots of social media friends, while "bad people" don't have friends and don't leave many traces of themselves online? According to recent Microsoft research, a spammer email account can be identified by the lack of connectivity to other people. Read More


WHITE PAPER: Raritan

Introduction to Data Center Infrastructure Management
This paper looks at how DCIM products can help you streamline operations, automate asset management, optimize resources and reduce costs. Read More

WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

What Microsoft paid The Stones to help launch Windows 95
So what did Microsoft really pay The Rolling Stones to use "Start Me Up" as the soundtrack for the advertising campaign that launched Windows 95? Read More

Microsoft launches Office 365, glosses over cloud limitations
CEO Steve Ballmer pitched his answer to Google Apps as Microsoft announced worldwide availability of Office 365, but made no mention of Microsoft's biggest cloud rival. Read More

Is Mozilla's lifecycle haste Microsoft's gain?
The Mozilla Foundation's decision to kick development into high gear may prove as disastrous and harmful to its product as Microsoft's complacency in letting Internet Explorer 6 languish for far too long hurt IE's place in the market. Read More


WHITE PAPER: HP

HP IT Migrates to an all HP network
It's no surprise when a high-tech company uses its own products. However, the story of how HP recently migrated its own network to HP Networking equipment has unique aspects that make it relevant to all enterprises in any industry or market segment. Read now

Microsoft patents spy tech for Skype
A newly patented Microsoft technology called Legal Intercept would allow the company to secretly intercept, monitor and record Skype calls. Privacy advocates are concerned. Read More

Microsoft signs two patent deals for Android devices
Microsoft signed two deals this week with companies that agreed to pay royalties for technology used in Android devices, following a similar deal the software giant made with HTC last year. Read More

Office 365: It's not just for SMBs
Microsoft CEO Steve Ballmer wasted no time in his keynote at the Office 365 launch in mentioning that Office 365 is an ideal solution for SMBs. Read More


WHITE PAPER: Aerohive

A Practical approach to Wireless 2.0
Creating "Wi-Fi that works" is a tall order given the breadth of client and application types, the speed and complexity of 802.11n, high-density environments, etc., controller-based vendors cannot live up to their promises of Ethernet-like determinism. Read now!

Office 365 apps for iPhone and Android not coming anytime soon
Microsoft launched Office 365 to the world this week, but the company's cloud product development is by no means complete. Read More

Envisioning a more perfect Windows 2012
Microsoft is all about keeping us busily working with fresh versions of Windows, and up to now, we've heard precious little about Windows Server changes. Indeed Windows 8 has been a huge distraction, after Microsoft pulled a rabbit out of its hat with the success of Windows 7. Read More

Microsoft boosts Java accommodations on Azure cloud
Windows Azure Plugin for Eclipse with Java helps Eclipse users build and configure deployment packages of their Java apps for Azure. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Cisco's Cius tablet to ship next month
  2. Gigabit Wi-Fi spec edges closer to reality
  3. Facebook bans KDE application, deletes user photos
  4. Symantec finds big differences in iOS, Android security
  5. Volume of data darn near indescribable ... without the iPad
  6. Geekiest wedding dress ever
  7. Microsoft patent may ruin Skype
  8. Zillow's rewrite of real-estate history upsets some homeowners
  9. Microsoft launches Office 365, glosses over cloud limitations
  10. Apple warned of phishing attack threat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **