Wednesday, July 25, 2012

First look: Opera 12 ups the ante

VMware snubs partner Cisco for network virtualization | 18 notable Apple alumni

Network World Network/Systems Management

Forward this to a Friend >>>


First look: Opera 12 ups the ante
The latest release of Opera has some obvious cosmetic and UI changes, as well as several new under-the-hood functions. Overall, here are 12 changes worth noting. Read More


RESOURCE COMPLIMENTS OF: TE Connectivity

TE Fiber Connectivity Solutions
TE Connectivity is helping private networks improve security and simplify management by delivering innovative fiber technology from data center to desktop. TE's QUAREO makes the physical layer an integrated part of the network. For the first time ever, enterprises have total visibility, security and control across the entire well-managed network. See how TE Connectivity is building the critical connections that make fiber deployment faster, capacity greater, installation simpler and networks more reliable. Read our Fiber Innovation Brief

WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

VMware snubs partner Cisco for network virtualization
VMware's $1.26 billion purchase of network virtualization startup Nicira this week is expected to increase competition and strain between VMware and longtime partner Cisco. VMware, the leader in server virtualization, is broadening its reach into network virtualization with the Nicira acquisition. Read More

18 notable Apple alumni
In its 36 years, Apple has watched a lot of its employees walk out the door and into great success of their own. While some with Apple ties are already well-known, others may be surprising to find on the list. Read More

War policy makers could learn from these robots
The Boston Globe this morning reports that some 248 robots belonging to the Navy -- specifically, 248 Man Transportable Robotic System MK 1 MOD 1 robots -- will be getting new software from their manufacturer, iRobot. The upgrade will cost taxpayers $7.7 million, which would seem a bargain considering the capabilities being touted. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Microsoft mum on whether it can tap Skype phone calls
Microsoft may or may not have the ability to tap Skype phone calls, but the company just won't say, and it's not clear why. Read More

Apple to formally attend Black Hat Security Conference for the first time
For the first time, Apple will officially be in attendance at the annual Black Hat security conference which is scheduled to run through Thursday of this week. This is a notable development for two reasons. First, Apple has never formally attended the conference. Two, many of the more prominent stories to emerge out of previous Black Hat events have centered on Apple security. Read More

Clemson CIO tapped for new Internet2 post
Clemson University CIO Jim Bottum has been named Internet2's first Presidential Fellow, a post that will entail serving as a liaison between Internet2 and the research community, other CIOs, government agencies and others. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

Tatu Ylonen, father of SSH, says security is 'getting worse'
Tatu Ylonen has garnered fame in technology circles as the inventor of Secure Shell (SSH), the widely used protocol to protect data communications. The CEO of SSH Communications Security -- whose crypto-based technology invented in 1995 continues to be used in hundreds of millions of computers, routers and servers -- recently spoke with Network World on a variety of security topics. Read More

Trash can moves to where you toss the trash
Just in case you haven't quite gone paperless yet, here's a prototype trash can that moves to where you toss those scrunched up balls of paper over your shoulder. The invention, out of Japan, appears to use a Microsoft Kinect sensor system to spy incoming trash, including drink cans and stuffed animals. Read More

INSIDER
Tech execs earn how much?
Be honest, you salivate when you see those stories about mega rich people. You are a bit envious, definitely jealous but then say to yourself that you must have a better quality of life than that millionaire. Anything to rationalize the situation. Read More

Black Hat makes light of accidental password-reset email
In explaining email, Black Hat organizer quotes Murphy's Law joke. Read More

SSDs still no threat to notebook hard drives
Notebooks equipped with hard drives will dominate the market for years to come, meaning the market for notebooks with SSDs pose no threat, according to a new report from iSuppli. Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Office 2013: What we still don't know
  2. iPhone 5 rumor rollup for the week ending July 20
  3. Smartphones of summer: The 12 hottest handhelds
  4. Bitcoin: Seven reasons to be wary
  5. Are firewalls dead?
  6. Microsoft code contains the phrase 'big boobs' ... Yes, really
  7. Earliest known photos of an Apple iPad prototype
  8. EFF: Americans may not realize it, but many are in a face recognition database now
  9. Microsoft employee on stack ranking and its 'most universally hated exec'
  10. Cisco's roller coaster July

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment