Friday, July 15, 2011

10 technologies that will change the world in the next 10 years

iPhone 5 rumor roll-up for the week ending July 15 | Mobile security risks: comparing iOS to Android

Network World Daily News PM

Forward this to a Friend >>>


10 technologies that will change the world in the next 10 years
3D printers, sensor networks, virtual humans and other technologies under development now will drastically change our world in the decade to come, according to Cisco chief futurist Dave Evans. Read More


WHITE PAPER: MSDI

Why Third Party Maintenance is Right for You
If you're looking to reduce costs and avoid hidden fees with a custom contract that allows you to pay for only what you need, third party maintenance may be the best option for you. Read now

WHITE PAPER: Palo Alto Networks

Next-Generation Firewall for Dummies eBook
This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls. Read now!

iPhone 5 rumor roll-up for the week ending July 15
July is half over and still no sign of The Next iPhone. The iOSsphere has been seething over conflicting rumors about when It will be announced, and released, about unbuttoning, panning, and the masses who still long for whatever it is Apple will be announcing soon or not so soon but, whenever, not soon enough. Read More

Mobile security risks: comparing iOS to Android
Calling an iPhone a phone is like calling Mount Everest a hill. Smart devices based on the iOS or Android mobile operating systems are powerful computers. They can run quite a few apps and increase the user's productivity, whether it's for personal or company use, or both. Unfortunately, these devices have security vulnerabilities, just as desktop and notebook computers do. Security and systems management vendor Symantec has produced a good guide to help you compare the security postures of the iOS and Android operating systems and understand where the greatest vulnerabilities are. Read More


WHITE PAPER: F5

Wide Area Application Architecture and Exchange 2010
Massive consolidation can lead to single points of failure which could interrupt service of critical applications. ESG believes that this risk should be addressed by building applications on a Wide Area Application Architecture (WAAA) foundation, spreading applications across multiple data centers. Learn More!

Researcher finds dangerous vulnerability in Skype
A security consultant has notified Skype of a cross-site scripting flaw that could be used to change the password on someone's account, according to details posted online. Read More

US military learning cybersecurity lessons from businesses
In its new cyberdefense strategy, the Pentagon is drawing on lessons about agility, lifecycle management and supply-chain protection that have already been learned by private corporations. Read More


WHITE PAPER: CA Technologies

Exceptional Application Experience
To improve and ensure the performance and availability of business-critical web applications, organizations need to be able to see and understand the actual user experience. This paper examines the five essentials of application performance monitoring. Learn More

Pentagon unveils five steps for better cybersecurity
The U.S. Department of Defense goes public with its strategy for cyberspace. Read More

This data center might be guarded by Mad Max
The Wall Street Journal this morning has an enlightening look at the ultra-secure SuperNAP data center in Las Vegas that is operated by Switch Communications Group in a manner that might call to mind Fort Knox. Read More

Getting a grip on Wi-Fi performance
The Wi-Fi client environment is growing chock-full of devices of varying output levels and receive sensitivities. The consensus seems to be that it's up to the enterprise-class Wi-Fi infrastructure vendors to tame the airwaves, while consumer client device makers focus on the slick and the cool. Read More

Office 365: Car Dealer Revs Up for Growth with Microsoft Cloud Service
Here's a look at how and why the Hendrick Automative Group is using Microsoft's Office 365 cloud service to relieve an overburdened staff, scale the company and save money. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. Cisco injects new life into Catalyst 6500 switch
  2. Anonymous hacks Monsanto, targets Exxon Mobil, ConocoPhillips
  3. Fears rise in IT circles over new economic downturn
  4. "Depraved" Wi-Fi hacker gets 18 years in prison
  5. Cisco will be leaner, faster, more attentive, Chambers pledges
  6. HP fires back at Cisco's Sup 2T
  7. US to let drivers test advanced wireless auto safety technology
  8. It's Mango vs. Apple in a battle of the fruitphones
  9. Can RIM turn things around with 7 new BlackBerry smartphones?
  10. Inside Apple iOS 5

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment