Friday, July 29, 2011

Happy SysAdmin Day. Are you feeling thankful?

Macs infringe S3 patents, could face U.S. import ban | How dare Twitter try to make money!

Network World Daily News AM

Forward this to a Friend >>>


Happy SysAdmin Day. Are you feeling thankful?
Today is the perfect day to show your appreciation for the unsung heroes who keep corporate desktops, servers and networks running. It's System Administrator Appreciation Day, an annual event thought up by IT pro Ted Kekatos. Read More


WHITE PAPER: Riverbed

Visualization of an Intricate Network
The Depository Trust & Clearing House required enhanced network visibility to support their custody and asset servicing valued at $40 trillion. See how Riverbed provided: • End-to-end visibility of encrypted traffic • Lower MTTR • Application and network activity analysis without requiring probes on every WAN link Learn more!

WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

Macs infringe S3 patents, could face U.S. import ban
A trade agency judge has ruled that some Macs infringe patents held by S3 Graphics and could be barred from the U.S., according to a decision made public Wednesday. Read More

How dare Twitter try to make money!
Twitter today announced that it will soon begin introducing "promoted tweets" - advertising messages, basically -- into user timelines (their catch-all tweet stream), and based on the reaction in some circles you might think that Twitter had literally unleashed a pack of spammers on its user base. Read More

iPhone 5 case moldings purport to show new iPhone design
Is this the iPhone 5 case? It's hard to say, but the above case schematic for the iPhone 5 surfaced earlier this week courtesy of MobileFun. Read More


WHITE PAPER: Splunk

Financial Services Firm Reduces Mean Time to Recovery
Literally every second counts, when downtime costs in the tens of thousands of dollars per minute. Learn why one U.S. financial services firm turned to Splunk and implemented a system that provides one global view of multiple logs to dramatically reduce their MTTR and paid for itself in just one month. Read more.

Who's stealing your data?
An alarming number of employees are exposing their companies to internal sabotage and theft. These aren't people who have been duped, these are people who knowingly violate company policies and -- in some cases -- criminal laws without compunction. Read More

Survey: Most enterprises will be on IPv6 by 2013
IT professionals overwhelmingly say they want their companies to be leaders not laggards in IPv6 adoption, Network World survey finds. Read More

Extending the private cloud: 5 keys to virtualization in a global environment
CIOs tasked with managing virtual servers across a global environment have to clear some hurdles to effectively optimize their infrastructure. Read More


WHITE PAPER: Riverbed

Visualization of an Intricate Network
The Depository Trust & Clearing House required enhanced network visibility to support their custody and asset servicing valued at $40 trillion. See how Riverbed provided: • End-to-end visibility of encrypted traffic • Lower MTTR • Application and network activity analysis without requiring probes on every WAN link Learn more!

Brocade seeks to stop sales of A10 Networks' application switch
Brocade wants to stop sales of a competitor's application controllers it claims infringe on its intellectual property. Read More

Google's two-step authentication goes worldwide
Google has rolled out its two-step authentication sign-in system to 40 languages across over 150 countries. Read More

When all else fails to protect your network, try game theory
If you're in charge of stopping hackers and malware from getting into your network, you might consider the job anything but a game. But security researchers in academia for years have been applying game theory to try to solve network security challenges. Read More

Hadoop growing, not replacing RDBMS in enterprises
The growing need for companies to manage surging volumes of structured and unstructured data is continuing to propel enterprise use of open source Apache Hadoop software. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment