Wednesday, November 02, 2005

Vulnerable security algorithms raise concerns

All the week's news and views about Network/Systems Management,
11/02/05
_______________________________________________________________
This newsletter is sponsored by Hitachi
Strategies for Midsize Businesses: How to Achieve
Enterprise-Class Business Continuity and Data Governance on a
Midrange Budget, Produced by Network World.

IT professionals running midsize operations have to be prepared
for time and monetary constraints regarding continuity, data
governance, compliance and data management. The following
special report: Strategies for Midsize Businesses: How to
Achieve Enterprise-Class Business Continuity and Data Governance
on a Midrange Budget addresses these issues in a timely way
http://www.fattail.com/redir/redirect.asp?CID=118663
_______________________________________________________________
BUILDING THE NEXT-GENERATION DATA CENTER

A next-generation data center relies on commoditized pools of
resources that can be combined to support a variety of
applications. But how can organizations transform their data
centers to the next-generation model? Nemertes Research has
reviewed over 120 products and selected those that will best
help you build your next-generation data center. Click here for
more:
http://www.fattail.com/redir/redirect.asp?CID=118500
_______________________________________________________________

Network World's Network/Systems Management News Alert

Vulnerable security algorithms raise concerns, 11/01/05

Industry experts agree that the future of two widely used
security algorithms is fated, but with no clear alternatives in
sight products that rely on them may have to remain "good
enough" for some time.
<http://www.networkworld.com/nlnetsystemsmgmt10211>

ScriptLogic spices management tool with inventory, patching,
anti-spyware, 10/31/05

ScriptLogic Tuesday plans to release the next version of its
desktop management software that adds inventory, management, and
security controls to the platform.
<http://www.networkworld.com/nlnetsystemsmgmt10212>

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
<http://www.networkworld.com/nlnetsystemsmgmt10213>
2. Gates, Ozzie go 'Live' with Microsoft services plan
<http://www.networkworld.com/nlnetsystemsmgmt10214>
3. Telecom merger approvals get mixed reviews
<http://www.networkworld.com/nlnetsystemsmgmt10215>
4. AT&T: Fall of an icon
<http://www.networkworld.com/news/2005/103105-att.html?t5>
5. FCC okays telecom mergers with conditions
<http://www.networkworld.com/nlnetsystemsmgmt10216>

_______________________________________________________________
To contact:

Senior Writer Denise Dubie covers network and systems management
for Network World. Reach her at <mailto:ddubie@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Hitachi
Strategies for Midsize Businesses: How to Achieve
Enterprise-Class Business Continuity and Data Governance on a
Midrange Budget, Produced by Network World.

IT professionals running midsize operations have to be prepared
for time and monetary constraints regarding continuity, data
governance, compliance and data management. The following
special report: Strategies for Midsize Businesses: How to
Achieve Enterprise-Class Business Continuity and Data Governance
on a Midrange Budget addresses these issues in a timely way
http://www.fattail.com/redir/redirect.asp?CID=118662
_______________________________________________________________
ARCHIVE LINKS

Management news page Latest management news, analysis and
newsletters http://www.networkworld.com/topics/management.html
_______________________________________________________________
Anytime, anywhere networking in the wireless world

Learn about the rapidly changing world of wireless networks and
mobile devices.
http://www.fattail.com/redir/redirect.asp?CID=118590
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

<http://www.networkworld.com/nlnetsystemsmgmt10217>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: