Saturday, February 11, 2012

10 Network World stories worth reading this weekend

Hottest iPad 3 design concepts | Data breach? Blame your third party's remote access systems

Network World Daily News AM

Forward this to a Friend >>>


Much of Western U.S. is a 3G wasteland, says FCC
The Federal Communications Commission has released a map showing which counties across the U.S. lacked coverage from either 3G or 4G networks and found that wide swaths of the western half of the country were 3G wastelands, particularly in mountainous states such as Idaho and Nevada. This isn't particularly surprising since it's much more difficult for carriers to afford building out mobile data networks in sparsely populated mountainous regions, but it does underscore how large stretches of the United States lack access to mobile data services that people in the Northeast, South and Midwest now take for granted. Read More


WEBCAST: VMware

Introduction to Virtualization
This video webcast is designed to help those with little to no virtualization experience understand why virtualization and VMware are so important to driving down both capital and operational costs. View Now!

WEBCAST: Infoblox

The CIO's View: Time-to-Value Through Automation
An IDG Research survey found that CIOs are eager to invest in technologies that will enable them to get new applications and services up quickly, achieving faster time-to-value. In this Webcast, you will learn how Benny Kirsh, CIO of Infoblox, is leveraging IT automation to gain faster time-to-value. View Now

Hottest iPad 3 design concepts
If you just can't wait for Apple to introduce the real iPad 3, enjoy these designer concept images for now Read More

Data breach? Blame your third party's remote access systems
An in-depth study of data-breach problems last year where hackers infiltrated 312 businesses to grab gobs of mainly customer payment-card information found the primary way they got in was through third-party vendor remote-access applications or VPN for systems maintenance. Read More

Four crazy tech ideas from Google's Solve for X project
Google promised radical technology proposals would be a part of its Solve for X project and its initial offerings so far haven't disappointed. Read More


WEBCAST: NEC

Transforming Enterprise Data Centers
Date: Tuesday, February 28, 2012, 10:00am PST Data centers everywhere are undergoing dramatic change, thanks to virtualization, cloud computing and the need to manage "big" data. Register Now!

Symantec verifies stolen source code posted by Anonymous is "legitimate"
Symantec is in an ongoing fight against hackers in the group Anonymous that last January attempted to extort a payment of around $50,000 from Symantec in exchange for not publicly posting stolen Symantec source code they had stolen for various older Symantec security products dating to 2006. Read More

Highly anticipated net virtualization startup Nicira exits stealth mode
One of the most anticipated debuts of a startup company happens today when Nicira, a maker of network virtualization software, comes out of stealth mode. Read More

FBI unbolts Steve Jobs 1991 investigation file
The FBI today released a background check it did on Apple's founder Steve Jobs when he was being considered for a position on the President's Export Council under George H.W. Bush in 1991. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

Mobile device management: Apple's extra little tricky requirement
Anyone wanting to buy mobile-device management (MDM) software to manage Apple iOS devices will find they need a special digital certificate from Apple to activate it, a requirement that doesn't apply to the same MDM software that would be used to manage Google Android devices, for instance. Read More

The When, Where and How of Cisco versus Microsoft for Unified Communications
Earlier this week I was at a CIO conference in Europe and one of the big topics of conversation was Unified Communications. Remote working, collaboration initiatives and cost cutting have all made UC a more important topic over the past twelve months. There was lots of discussion about deployment issues, the ROI of UC, training issues, etc. but the biggest point of discussion was Cisco versus Microsoft... Read More

Ubuntu Business Desktop Remix Rolls Out
"Before anyone gets all worked up and conspiratorial: everything in the remix is available from the standard Software Centre," Shuttleworth explains. "Packages out, packages in. No secret sauce for customers only; we're not creating a RHEL, we already have an enterprise-quality release cadence called LTS and we like it just the way it is." Read More



SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. No, Wikipedia has not forgiven GoDaddy for backing SOPA
  2. FBI unbolts Steve Jobs 1991 investigation file
  3. Cisco still dragging feet on OpenFlow
  4. Amazon attacks Apple: You get 3 Kindle products for price of iPad 2
  5. iPhone 5 release set for summer 2012 -- report
  6. Microsoft to issue 9 patches, 4 critical
  7. Four crazy tech ideas from Google's Solve for X project
  8. iPad 3 on track for early-mid March release
  9. Mobile World Congress sneak peek
  10. Buyers lining up for Raspberry Pi's PC

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: