Monday, August 06, 2012

Citrix, Microsoft, Dell, & VMware reinvent desktop delivery

Defcon Wi-Fi hack called no threat to enterprise WLANs | eBay puts OpenStack to work

Network World Network/Systems Management

Forward this to a Friend >>>


Citrix, Microsoft, Dell, & VMware reinvent desktop delivery
There are a few stars aligning that are about to make application and desktop delivery an interesting task for IT. Read More


WHITE PAPER: Citrix Systems

Join the Scale Revolution in Cloud Networking
Transform your enterprise data centers into a highly scalable enterprise clouds. Learn how to scale your cloud network for more elastic performance, seamless expansion and simple consolidation. Download whitepaper and enable multi-dimensional scalability for your enterprise cloud. Learn More

WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Defcon Wi-Fi hack called no threat to enterprise WLANs
Security researchers at the recent Defcon event showed a successful attack against one part of Wi-Fi network security, but experts say it will have zero impact on enterprise WLANS. Read More

eBay puts OpenStack to work
eBay goes public about its first implementation of OpenStack along with Nicira network virtualization, hinting at broader adoption to come. Read More

What the iPhone 5 may very well look like
Putting aside all of the iPhone prototype news that has been floating around the past few days, there's some iPhone 5 news worth mentioning. A slew of credible sources, from the New York Times to Bloomberg, are all reporting that Apple is planning to hold a special media event on Wednesday September 12 where it's largely believed the company will take the wraps off of its next-gen iPhone. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

Car-hacking: Bluetooth and other security issues
Thanks to increased computerization and access to the outside world for functions including music and social networking, researchers have successfully hacked cars -- brakes applied remotely, conversations overheard, GPS signals interfered with. This has potentially disastrous consequences, especially for managers of large fleets of trucks, cars and other vehicles. Read More

INSIDER
Three tools to pinpoint rogue access points
Locating and tracking an object via radio waves has been in everyday use since the WWII invention of RADAR (Radio Detection And Ranging). Today, everybody from automobile drivers to airline pilots to mapmakers to construction professionals rely on GPS, another form of radio-based location and tracking. Read More

Facebook, Twitter accounts of Yankees, other teams compromised
The official social media accounts of several Major League Baseball teams were compromised Thursday, leading to some embarrassing messages appearing on the Facebook and Twitter accounts and highlighting the risks social media sites can present for the public image of businesses. Read More


WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

US House to ITU: Hands off the Internet
The U.S. House of Representatives voted late Thursday to send a message to the United Nations' International Telecommunication Union that the Internet doesn't need new international regulations. The vote was unanimous: 414-0. Read More

IT execs explain their moves to solid-state storage
The adoption of flash storage in the enterprise is boosting database performance, cutting in half the time needed for nightly full backups and providing users with real-time responses. Here's how four companies chose to up their game with flash. Read More

Identity theft may cost IRS $21 billion over next five years
The dead can't speak for themselves. But they can apparently file U.S. tax returns. Read More



SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Ask an IT support pro: Why I hate live chat
  2. Serval: Princeton researchers tout "Layer 3.5" Internet upgrade
  3. Nokia preps to sell Qt, but not before Elop screws it up
  4. Cisco stays the network virtualization course
  5. Wikipedia-sponsored 'pilot study' lauds Wikipedia accuracy
  6. Apple initially wanted an iPhone with shaped glass, deposition reveals
  7. 'Anonymous' turns in hacker who targeted children's charity
  8. Earliest known photos of an Apple iPad prototype
  9. Android news and rumor roundup for week ending Aug. 3
  10. French T-shirt company relenting in face of Anonymous threats

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment