Search This Blog

Friday, January 23, 2015

Survey: Cybersecurity pros endorse data breach notification rules

10 cool network and computing research projects | Acompli: A look at Microsoft's new mobile email tool

Network World Compliance

Survey: Cybersecurity pros endorse data breach notification rules
Three quarters of ISACA members say they support Obama's proposal Read More


WHITE PAPER: Attachmate

Why your existing solution might not be adequate
To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More

WHITE PAPER: NetApp

Steps to Simplifying Private Cloud Deployment
Today, all the rules are being rewritten, both inside and outside the data center. The reason: virtualization. Read this paper to see how enterprises can derive competitive advantage by using virtualization technologies to build the most agile infrastructures. View Now>>

10 cool network and computing research projects
If you think the latest enterprise and consumer network and computer technologies rolling into your data center and being snuck into your offices by end users are advanced, wait until you see what's cooking in the labs at universities and tech companies. Much of well-funded research is aimed at security, simplifying use of current technology and figuring out how to more easily plow through mounds of big data. Here's at peek at 10 projects.  Idiot-proof Smartphone Charging Microsoft researchers are working on technology to make smartphone charging much less of a burden for users. The techniques being explored include an image-processing technique for detecting and locating smartphones in an office as well as solar/photovoltaic cell technology that works indoors to AutoCharge phones via a beam of light.To read this article in full or to leave a comment, please click here Read More

INSIDER
Acompli: A look at Microsoft's new mobile email tool
As much as we try to, we simply cannot seem to shake our collective email habit. We embrace social networks for collaboration, we use SharePoint for productivity and document sharing, we run Skype to bring us closer and more connected with our colleagues. But at the end of the day, email is the lowest (and most popular) common denominator among working professionals. It is important that the tooling for handling email be great; sadly, this has not usually been the case on our beloved smartphones.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Users get more control over data in latest Firefox beta
Users and websites will be able to manage what data is sent to other websites Read More


WHITE PAPER: Worksoft, Inc.

IDC Reports the ROI of Automated Business Process Validation
Industry analyst firm IDC examines the value proposition driving large SAP® customers to adopt automation as their new standard in quality assurance. The study quantifies ROI at 12 of the world's largest companies using Worksoft business process validation software, with benefits worth $4.2 million annually and a five year NPV of $11 million. Learn More

People are increasingly worried about privacy, say legal protections fall short
Technology has had a negative impact on privacy, said a majority of those questioned in a recent global survey Read More

Cleared your browser cookies? It won't stop ad company using Verizon tracking header
An advertising company uses the unique identifier headers added by Verizon to Web traffic to recreate tracking cookies deleted by users Read More

Huawei's elusive founder tries to dispel spying concerns, and air of mystery
Huawei founder Ren Zhengfei gave a rare interview on Thursday Read More


WEBCAST: CenturyLink

Is your IT strategy helping you reach your goals?
This webinar will discuss how to begin down a Hybrid IT path that adds on to your current on-premise IT infrastructure. What workloads make the most sense to move off-premise? Learn More

Attackers are exploiting a zero-day vulnerability in Flash Player
The exploit was included in the Angler exploit kit, a security researcher reported Read More

HealthCare.gov sending personal data to Twitter, Yahoo and Google
Privacy advocates warn the data could be misused Read More

Oracle to fix 167 vulnerabilities, including serious backdoor-like flaw in E-Business Suite
The E-Business Suite vulnerability can give attackers complete control over databases that store sensitive business information Read More

Report: NSA not only creates, but also hijacks, malware
Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies Read More


SLIDESHOWS

2015's 25 geekiest 25th anniversaries

A look back at the most memorable tech-related happenings of 1990.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Why did Microsoft skip Windows 9 and jump to Windows 10?

2. 10 cool network and computing research projects

3. Scared of 802.11AC Wave 2 Wi-Fi? Here comes Cisco Multigigabit to the rescue

4. The hottest 3D printing projects

5. Windows 10 to be free upgrade for many during its first year

6. New Google Translate includes VR signage, photo and speech

7. HealthCare.gov sending personal data to Twitter, Yahoo and Google

8. Peeping into 73,000 unsecured security cameras thanks to default passwords

9. Illinois schools can legally demand students' social media passwords

10. Uh oh, Google, here comes Microsoft's HoloLens


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: