Wednesday, June 22, 2011

We've already reached 'peak Android,' says analyst

Ponemon study: Cyber attacks more frequent, severe | Innovation Final: Vint Cerf vs. Steve Jobs

Network World Daily News AM

Forward this to a Friend >>>


We've already reached 'peak Android,' says analyst
Android may have ruled the smartphone world for the past year, but it's due for a significant fall once the iPhone 5 comes out, according to one equity analyst. Read More


WHITE PAPER: AirMagnet, Aruba Networks, Cisco, Enterasys Networks, HP, and Motorola

The 2011 Wi-Fi "Cheat Sheet"
Achieving Ethernet parity with Wi-Fi is no small task. Learn how leading vendors are building tool and tweaking architectures to: • Add capacity to APs • Avoid traffic bottlenecks • Identify and eradicate interference and its sources • Enable converged management and policy setting across Wi-Fi and wired environments Read now!

WHITE PAPER: AirMagnet

Overlay vs. Integrated Wireless Security
A well-known best practice in the enterprise is to take a layered, defense-in-depth approach to network security to guard against different kinds of attacks and intrusions. Likewise, the wireless LAN (WLAN) environment requires multiple security layers, too. Read now!

Ponemon study: Cyber attacks more frequent, severe
Cyber attacks are becoming more frequent and severe, and the vast majority of businesses have suffered at least one data breach in the past year, a Ponemon Institute survey says. Read More

Innovation Final: Vint Cerf vs. Steve Jobs
In what will be a two-day open voting, it is the Father of the Internet vs. the person who has brought consumerization into the enterprise. Vint Cerf and Steve Jobs have steamrolled their way through the field to get to the finals. It is now a chicken-and-egg situation: without the Internet would Apple's products be as popular today? Or did Apple's products push the Internet to new heights? Vote now! Read More

Northrop Grumman constantly under attack by cyber-gangs
About a dozen separate legions of organized hackers have been diligently attempting for years to break into aerospace and defense company Northrop Grumman to steal sensitive information, the company's chief information security officer (CISO) said at a Gartner security conference. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

Mozilla retires Firefox 4 from security support
Unnoticed in the Tuesday release of Firefox 5 was Mozilla's decision to retire Firefox 4, the browser it shipped just three months ago. Read More

New camera technology lets you shoot first, focus later
Who knows whether anyone will actually buy this camera in an age where every smart phone already is one, but the pictures it produces are unlike anything my meager photographic skills have created with a point-and-shoot. Read More

A Cisco engineer says changes at Cisco are good
While attending the Cloud Leadership Forum in Santa Clara this week, I had lunch today with a Cisco engineer who has worked for the company for 11 years. He was strikingly optimistic about the company, telling me that it feels like the old Cisco from about eight years ago, is coming back. Read More


WHITE PAPER: IBM

Cloud Computing Drives Improvements in IT Service Delivery
IDC OPINION Cloud computing promotes a new dialogue between business and IT decision makers allowing them to define business service requirements first and then decide how to balance the use of shared, internal virtualized IT resources and external public services cost-effectively. Read now

ITC starts looking at Cisco products
The U.S. International Trade Commission (ITC) will investigate certain Cisco products, based on a patent infringement complaint filed by Canadian intellectual property owner MOSAID. Read More

CIO wannabes told to think outside the box
IT workers who want to be a CIO need to think outside the box -- like pushing for staff to spend 10% of their time working on something other than operational tasks, according to advice at a recent CIO conference. Read More

DNS agility leads to botnet detection
Research out of the Georgia Institute of Technology can detect when bot masters reserve domains to set up command-and-control networks. Read More

A $300 Titanium iPhone case doesn't sound pretentious at all
Far be it from me to criticize a company for trying to make some money, but at first glance the $300 Titanium iPhone 4 case from Case-Mate seems a bit extreme, especially when it costs more than the iPhone (or the same if you get the 32GB model) it's protecting. Read More

9 Ways to Stop Your Outsourcing Deal From Leaking Money
Experts estimate that an outsourcing deal can lose up to 30 percent of its value each year due to poor governance. Here's how to plug the holes. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. Gartner: IT should be planning, moving to private clouds
  2. 12 ways the cloud changes everything
  3. First look at Windows Azure
  4. Pilots spar over wisdom of relying on iPads in the cockpit
  5. Most IT pros don't fear losing their jobs to the cloud
  6. NSA wants bulletproof smartphone, tablet security
  7. Wi-Fi client surge forcing fresh wireless LAN thinking
  8. How RIM is getting left behind
  9. Company claims it can disregard GPL requirements
  10. Dropbox left document storage accounts open for four hours

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment