Tuesday, October 25, 2011

New copper theft foil: Bust the drivers

MIT building tracks researchers, visitors | Is Cloud-Based Security in Your Future?

Network World Security

Forward this to a Friend >>>


New copper theft foil: Bust the drivers
With news today that copper prices are on the rise again - up 7% to $3.45 a pound, in over a month - law enforcement officials are looking for new ways to put a crimp in copper and metal thefts that continue to plague almost every community in the US. Read More


RESOURCE COMPLIMENTS OF: Cisco Systems

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

RESOURCE COMPLIMENTS OF: Cisco Systems Inc.

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

MIT building tracks researchers, visitors
New tracking technology inside the MIT Media Lab monitors everything from office thermostats, to social media buzz to the location of workers. Read More

Is Cloud-Based Security in Your Future?
Hi ho, hi ho it's off to the cloud we go! We go to the cloud for office applications, CRM, email, computing, storage, etc. Increasingly, we go to the cloud for security services. It's interesting that while the cloud delivers some of the greatest security threats it also delivers some of the greatest security opportunities—opportunities that up until now have only been available as on-premise... Read More


WHITE PAPER: Raritan

What's Your Power Consumption Baseline?
Rule-of-thumb estimates for power consumption are no longer sufficient. Discover a quick way to establish baseline power measurements with intelligent rack power distribution units (iPDUs) to meter the power and wireless sensors communicating that information, and eliminate the need for Ethernet connections to iPDUs. Learn More

By the Numbers: The Impact of Data Breaches
Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding. Read More

Raytheon: Boosting data center temperatures cuts energy use by 30%
As the IT sustainability program lead at Raytheon, Brian Moore says he saw a chance to learn from the company's past successes to find ways to deliver even more results. Read More


WHITE PAPER: AMD

The Accelerated SMB: Moving at the Speed of Virtualization
Mid-market corporations increasingly rely on technology to serve as the enablers and accelerators of the business—not just to reduce costs but also to empower new business initiatives and increase the top line. Learn More!

New Security Flaws ID'd in BlackBerry 6 OS, Enterprise IM Apps
BlackBerry-maker RIM has identified a number of significant security flaws that affect the Webkit browser in its BlackBerry 6 handheld OS and enterprise IM applications from Microsoft. Read More

Wikileaks suspends operations, cites lack of funds
Whistleblower Web site Wikileaks today announced that it was temporarily suspending operations due to financial constraints. Read More

Microsoft's YouTube channel gets hijacked and wiped clean
Microsoft's official YouTube channel was hijacked on Saturday and all videos hosted on it were temporarily removed. The hacker replaced them with others claiming that Microsoft is holding a contest. Read More



SLIDESHOWS

2011 tech industry graveyard
Fortunately for the tech industry, there's a lot more living than dying, with 2011 seeing the birth of everything from Apple's iPad 2 to the Google+ social network. But inevitably, 2011 has also seen its share of dead, killed, murdered, offed, obliterated companies, technologies and ideas as well. Here's your chance to pay last respects, and who knows, maybe a few of these will sprout back to life.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending Oct. 21
  2. The Microsoft/Android war: Which patents are at stake?
  3. Cisco CEO's pay falls 32%
  4. Gartner: 10 key IT trends for 2012
  5. Gartner: 16 long-held IT business practices you need to kill
  6. iPad 2 vs. business class tablets
  7. Cheap power: An overnight revolution
  8. Wi-Fi devices crowd 2.4GHz band; IT looks to 5GHz
  9. SQL injection attack has compromised nearly 200,000 ASP.Net sites
  10. Steve Jobs ranted, raged against Android as 'grand theft'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment