Tuesday, October 23, 2012

Gartner: 10 critical IT trends for the next five years

  The Case for /127 Subnets | Does Microsoft Oppose Verizon Spying? Verizon allegedly wants more control over WP8
 
  Network World Security

Forward this to a Friend >>>


Gartner: 10 critical IT trends for the next five years
Trying to stay ahead of the curve when it comes to IT issues is not a job for the faint of heart. That point was driven home at Gartner's IT annual IT Symposium fest here where analyst David Cappuccio outlined what he called "new forces that are not easily controlled by IT are pushing themselves to the forefront of IT spending." Read More


RESOURCE COMPLIMENTS OF: McAfee

McAfee Network Security Platform
Learn about the latest on security threats, design strategies for ensuring data center security, and real-life examples of how McAfee Network Security Platform actually works. Download now

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Tuesday, October 30th at 12:00pm ET Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

The Case for /127 Subnets
Read More

Does Microsoft Oppose Verizon Spying? Verizon allegedly wants more control over WP8
Lockergnome founder Chris Pirillo took Windows 8 to the street and randomly asked people to try it. Folks were confused and looked for the Start Menu and Taskbar. In fact, the experiment showed that "real users have no clue how to use Windows 8," Geek.com reported. Read More


WHITE PAPER: HP & Intel

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Are You Ready For A Cloud Security Officer?
GRC has always been a solution for big companies. Governance, Risk and Compliance pulls together lots of disparate data and seeks to give a broader picture of an organizations Risk posture, where it stands on compliance with various rules and regulations and its own thresholds for security. The problem is putting all of that together is a big job that only a big company could handle. Now TraceCSO... Read More

Gartner: Do you have a Chief Digital Officer? You're gonna need one
ORLANDO -- Do you have a Chief Digital Officer? The gurus at Gartner think you should, and soon. Read More


WEBCAST: Aternity

Managing IT through the Lens of the End User
Hosted by BMC Software and Aternity, this live webinar - Tuesday, October 30th 2012 ~ 11 AM PT or 2 PM ET - will reveal the value of complementing your Application Performance Monitoring (APM) strategy with End User Activity Monitoring (EUAM) in order to enable better user-focused IT services that drive optimal business practices. Register now.

FTC throws down robocall gauntlet: $50,000 for best way to stop annoying calls
It's not clear if the Federal Trade Commission is throwing up its hands at the problem or just wants some new ideas about how to combat it, but the agency is now offering $50,000 to anyone who can create what it calls an innovative way to block that will block illegal commercial robocalls on landlines and mobile phones. Read More

Kaspersky's exploit-proof OS leaves security experts skeptical
While there is a need for a more secure operating system for industrial control systems, experts say a U.S.-built OS would be preferred Read More

Many Android apps from Google Play security-challenged
Hundreds of free apps in the Android market vulnerable to man-in-the-middle attacks as a result of unsound use of secure socket layer (SSL) Read More

High court nixes appeal of AT&T, NSA wiretap Case
The U.S. Supreme Court refuses to hear an appeal of a lower-court court decision upholding legal immunity for telecom companies that allegedly participated in an NSA surveillance program during the last decade. Read More

 
 
 

SLIDESHOWS

25 essential business apps for iPhone 5
The iPhone 5 is here, so it's time to start loading it up with apps.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Ubuntu 12.10 review: Quantal Quetzal is quite adequate
  2. 15 hot Windows 8 hybrid notebooks and tablets
  3. Microsoft kicks off free Office 2013 upgrades
  4. Firewalls don't cut it anymore as the first line of defense
  5. Is Qualcomm the new AMD? Or the next Intel?
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Juniper may be for sale, but not to EMC
  8. .xxx to launch porn search engine
  9. Does Microsoft oppose Verizon spying?
  10. Six of the rarest Macs
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment