|Massive payments data breach originating with Central American gang through NYC garage? | Inside Google's London Campus, an incubator for tech startups |
|Network World Daily News PM|
Dissecting Cisco's FabricPath Ethernet technology
RESOURCE COMPLIMENTS OF: Rocky Mountain IPv6 Task Force
2012 North American IPv6 Summit
Become a certified IPv6 Engineer! Nephos6, in collaboration with the IPv6 Forum is hosting IPv6 certification testing. 2012 NA IPv6 Summit attendees can test for IPv6 certification during the conference. Save $50 off conference registration with this code: SPON700. Register Now
In this Issue
Distributed Network Analysis for Distributed Applications
Corporate computing has crossed the threshold to highly distributed -- whether your organization has 50 or 50,000 employees. It's imperative that you distribute your network analysis capabilities. Learn technologies and approaches to best deal with today's highly distributed network applications View Now
Massive payments data breach originating with Central American gang through NYC garage?
Inside Google's London Campus, an incubator for tech startups
Windows 8 Update: Back up Windows Server 8 to the cloud
WHITE PAPER: Silver Peak Systems, Inc.
Optimizing Offsite Disaster Recovery with Virtual WAN Op
Learn why one of the world's largest media companies chose Silver Peak virtual WAN Optimization for their cross country replication challenges including an on-demand media database requiring 7 x24 access. Complicating the challenge was a lack of space in the state-of-the-art data center for additional physical hardware. No problem. Learn more.
New IBM CEO in middle of Masters golf controversy
Ukraine shuts down forum for malware writers
Intel plans 'superchip' for high-performance computing
WHITE PAPER: PhoneFactor
5 Critical Considerations Before Renewing Security Tokens
As the threat landscape and needs of your users rapidly change, technology must also quickly evolve. This paper addresses five critical factors all IT buyers should consider before renewing or extending their security token implementation so they don't make a vital mistake by overpaying for outdated authentication technology. Learn More
BlackHole exploit targets Java bug through browser-based attacks
Social media helps make indelible mark on lifesaving cause
Cloud Value Must Extend Past Cost Savings
The Byte - RIM revenue, Android tablets, Dell smartphones, OnStar Family Link
20 iPad business apps every CIO should want
JOIN THE NETWORK WORLD COMMUNITIES
Do You Tweet?
You are currently subscribed to networkworld_daily_news_alert as email@example.com.
To contact Network World, please send an e-mail to firstname.lastname@example.org.
Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly, send an e-mail to email@example.com. **
Friday, March 30, 2012
|If you have trouble viewing this email, read the online version.|
|TechWeb Networking News Update -- Issue Highlights:|
| • TOP STORY: Virtualization, Unified Communications Meet, At Last |
• ALSO SEE: Computing Cartels Shake Up IT Purchasing
• ANALYTIC REPORT: Fundamentals: 10 Steps to Effective Data Classification
• WHITE PAPER: Extending the Value of Legacy Applications Through Application Transformation
• MOST POPULAR: 10 CIOs: Career Decisions I'd Do Over
• BLOG: Seagate's HAMR Time: Can't Touch This...Yet!
• WEBCAST: How Can You Be Certain Your Environment is Still Locked Down?
• RESOURCES: Take Our Public Cloud Survey