Thursday, March 29, 2012

Cisco forces manufacturer's hand; company adopts Microsoft Lync

  10 funny (?) April Fools' pranks - Web style | Threat of a bullet in the face keeping cybercrooks conservative
 
  Network World Daily News PM

Forward this to a Friend >>>


Cisco forces manufacturer's hand; company adopts Microsoft Lync
Cisco forced the hand of Creation Technologies to adopt Microsoft's Lync communications platform for conferencing, and now the company has the package on its roadmap to replace disparate, isolated PBXs in the future. Read More


WHITE PAPER: APC

Allocating data center energy costs and carbon to IT users
This paper provides an overview of energy cost and carbon allocation strategies and their precision. We show that it is both easy and inexpensive for any data center, large or small, new or old, to get started allocating costs and carbon, but the expense and complexity escalate and ROI declines when excessive precision is specified. Learn More

WHITE PAPER: PhoneFactor

Guide to Evaluating Two-Factor Authentication Solutions
Whether you're planning to implement two-factor authentication for the first time or are looking to expand or upgrade your current implementation, this whitepaper will help you choose the two-factor solution that is right for your business. Learn More

10 funny (?) April Fools' pranks - Web style
Our roundup of some of 2011's Internet-based April Fools' pranks should get you in the mood for this year's inevitable crop. Get ready to wince. Read More

Threat of a bullet in the face keeping cybercrooks conservative
Scott Borg, director of a cybersecurity research institute, kicked off the SecureWorld Expo Boston with an uplifting talk about the end of the cybersecurity world as we know it. Sure, more sophisticated threats are on the way, but those in cybersecurity also have new opportunities to defend threats and even enable economic growth. But it was the head of the U.S. Cyber Consequences Unit's take on why cybercriminals are actually more conservative than you might think that got the biggest reaction from the audience of IT security industry professionals. In fact, Borg say his organization has sometimes been off on its predictions because cybercrime trends have taken longer to emerge than expected. Read More

President Obama targets $200 million for big data boost
The U.S. government is the poster child for big data and today President Obama is set to announce a $200 million research program to bolster the tools and techniques needed to access, organize, and glean discoveries from huge volumes of digital data. Read More


WHITE PAPER: SonicWALL

Next-Gen Firewalls for K-12: Hall County Schools
How Hall County Schools leverages SonicWALL Appliance Intelligence, Control and Visualization for bandwidth management and prioritization of application traffic for VoIP, video conferencing and social media resources. Read now.

Ethernet Alliance chair talks about key trends, what's next
John D'Ambrosia, Chief Ethernet Evangelist in the CTO Office at Dell (he came onboard when Dell bought Force10), is a founder of the Ethernet Alliance and currently serving as its chairman. Network World Editor in Chief John Dix recently caught up with D'Ambrosia for an update on the Alliance and Ethernet advances. Read More

Windows 8, Phone 7 are the last gasp for Microsoft dominance in smart devices
Windows 8 better be a hit if Microsoft wants to head off being toppled by Android as the dominant operating system for PCs, media tablets and smartphones, according to IDC. By 2016, Android devices will account for 31.1% of the market, with Windows trailing with 25.1%, according to results from three IDC studies. Last year, Windows led with 35.9%. Read More

DARPA does Big Data in a big way
As part of the Federal Government's Big Data Extravaganza, the Defense Advanced Research Projects Agency (DARPA) detailed some of its programs the agency says could benefit from the $200 million research program announced today by President Obama. Read More


WHITE PAPER: BMC

Switching Schedulers – Not As Complicated As You Think
Changing or consolidating job schedulers may seem daunting. However, the benefits of switching to enterprise workload automation outweigh the risks. Read how BMC can help realize goals like reduced cost, top-down visibility, improved SLAs, and a single enterprise view across all platforms. Learn More Today!

Chrome 18 Arrives with Nine Security Fixes
Google on Wednesday released Chrome 18 to its Stable channel complete with several new features and fixes for nine security vulnerabilities. Read More

In praise of alternative approaches to cybersecurity
After spending a lot of time reading a lot of words about a lot of cybersecurity attacks, trends and patterns start to take shape. Read More

Open-source designs for your very own tricorder now available online
Ever wanted to wave a tricorder at something, furrow your brow, and announce, "captain, I am picking up an odd concentration of signals in this area?" If you have - and what Star Trek fan hasn't? - you might want to give Peter Jansen's tricorder project a look. The Canadian designer recently released full specifications for two versions of his own hand-held multi-sensor. Read More

Microsoft bot takedowns help, but are no cure
Takedowns of Zeus botnet command and control servers like the one executed last week by Microsoft and others do reduce the criminal activity they spawn - for a while - but attackers learn from the experience and come back with more sophisticated techniques, a security expert says. Read More

 
 
 

SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. IETF attendees reengineer their hotel's Wi-Fi network
  2. New Google Account Activity lets you know what Google knows about you
  3. Cisco acquires home network management company
  4. Cloud services face taxing dilemma
  5. More fun with naming wireless nets
  6. Steve Jobs wasn't a fan of the Siri name
  7. International security team shoots down second Hlux/Kelihos botnet
  8. Firewall fail: A tale both funny and sad
  9. Critical milestones in Cisco history
  10. 7 password managers for Windows, Mac OS X, iOS, and Android
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment