Monday, February 11, 2013

12 hybrid security products to watch

Reports: Apple exploring watch-like devices

Six tips for the care and training of new users

Network World Daily News PM
February 11, 2013
Share this email

12 hybrid security products to watch

Securing a hybrid cloud is not the same thing as deploying hybrid security products.

READ MORE
 

Issue highlights

1. Reports: Apple exploring watch-like devices

2. Six tips for the care and training of new users

3. VMware's problems are deeper than just Microsoft

4. Hybrid clouds pose new security challenges

5. What President Obama CAN Do About Cybersecurity

6. Flickr privacy bug changes some private photos to public, then public to private

7. 10 Cisco partners you should get to know

8. Feds offer $20M for critical energy network cybersecurity tools

9. About that Facebook shutdown and those RFID implants

10. PaaS Primer: What is platform as a service and why does it matter?

11. UK's accounting watchdog investigating Autonomy finances pre-HP deal

12. INSIDER ROI calculations done right can help IT projects

WEBCAST: HP

Determine Your Cloud Storage Readiness

Cloud will impact your storage environment. Hear what a HP Storage expert has to say. View Now!

Reports: Apple exploring watch-like devices

Apple is experimenting with watch-like wearable devices with some smartphone capabilities, as the company looks at new product categories for future growth, according to reports. READ MORE

Six tips for the care and training of new users

Got a new user? As a responsible IT organization you have to recognize that this is a big responsibility. READ MORE

RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies

Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

VMware's problems are deeper than just Microsoft

Remember this blog post? It's my now infamous "Bell tolls for thee" blog that I authored just after VMworld last year. This was the blog for which I was so soundly flogged by the VMware community in the comments section, and even received a few nasty emails. (By the way, I do want to thank all of the people who comment on my blogs. Whether you agree or disagree with me, it's always good to have... READ MORE

WHITE PAPER: Fiberlink Communications

The ABCs of Mobile Device Management

Check out our "ABC's of Mobile Device Management" e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today! Learn More

Hybrid clouds pose new security challenges

If 2013 is the year enterprises begin implementing their hybrid cloud strategies, as the experts are predicting, then it follows that this will also be the year when hybrid cloud security takes center stage. READ MORE

WHITE PAPER: Symantec

Improving SMB Profitability by Optimizing IT Management

Small businesses are under increasing pressure to sharpen their business practices. Cloud computing and technology outsourcing provide affordable access to resources that can make a competitive difference. Download this IDC Whitepaper, Improving Small Business Profitability by Optimizing IT Management. Read Now!

What President Obama CAN Do About Cybersecurity

When it comes to cybersecurity and public policy, I'm as big a cynic as anyone. Why? From a historical perspective, cybersecurity issues were first recognized during the Bush administration (41, not 43). Over the subsequent 20+ years we've experienced misinformed rhetoric, overlapping agendas, and inaction but little meaningful progress. READ MORE

Flickr privacy bug changes some private photos to public, then public to private

Across the web, you may frequently come across broken Flickr images replaced with "This image or video is currently unavailable." Flickr discovered a software bug that affected privacy settings; some users' private photos became public for 20 days, then as a precaution Flickr set public photos to private. The result is "bad" links all over the place that cause the "currently unavailable" error message.... READ MORE

10 Cisco partners you should get to know

READ MORE

Feds offer $20M for critical energy network cybersecurity tools

The US Department of Energy today said it would spend $20 million on the development of advanced cybersecurity tools to help protect the nation's vulnerable energy supply. The DOE technologies developed under this program should be interoperable, scalable, cost-effective advanced tools that do not impede critical energy delivery functions, that are innovative and can easily be commercialized or made... READ MORE

About that Facebook shutdown and those RFID implants

The Snopes.com email newsletter has become something of a Sunday habit because I enjoy reading about the unbelievable nonsense that some people nonetheless manage to believe. Yesterday's featured a pair of doozies, and while neither is brand new, I feel they're worth sharing. The first one is funny. READ MORE

PaaS Primer: What is platform as a service and why does it matter?

Even most non-techies probably have an idea of what cloud computing is by now, but when you start getting into IaaS vs. SaaS vs. PaaS even those of us in the industry can struggle. READ MORE

UK's accounting watchdog investigating Autonomy finances pre-HP deal

The U.K.'s Financial Reporting Council has launched a probe into Autonomy's financial reporting over a period of more than two years prior to its acquisition by Hewlett-Packard. READ MORE

INSIDER

ROI calculations done right can help IT projects

Building a solid business case for your IT projects means nailing the financial calculations and language. CIOs say making accurate ROI predictions can pay off. Insider (registration required) READ MORE

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Cisco partners you should get to know

2. Windows 8 update: Winter storm Nemo wipes out Microsoft Surface party

3. If Xbox rumors are true, Microsoft may be making a huge mistake

4. Internet Explorer flaws fixed by Microsoft Patch Tuesday updates

5. Microsoft sells out of 128GB Surface Pro

6. What's up with VMware?

7. Cisco vs. Juniper: How different are their SDN strategies?

8. 25 techie Valentine's Day gift ideas

9. iPhoneys: The iPhone 6 and iPhone 5S edition

10. Cisco loses round in fight against patent troll

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment