Friday, August 17, 2012

The privacy cat is out of the bag

  iPhone 5 rumor rollup for week ending Aug. 17 | Back-to-school tech guide 2012
 
  Network World Daily News PM

Forward this to a Friend >>>


The privacy cat is out of the bag
There comes a point in many situations where you have to recognize that the cat is not only out of the bag, it has stolen your wallet and your car keys and has taken the I-15 to Vegas. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Quickly Identify Misconfigured Active Directory Permissions
What users have access to sensitive files or directories? Find out without tedious manual effort. Troubleshoot permissions issues both locally and on remote shares with SolarWinds free tool, Permissions Analyzer for Active Directory. Easily see what permissions a user or group of users has for an object and why. Get a complete hierarchical view of the effective permission and access rights for a specific file folder or share drive today by downloading the free tool. Get Permissions Analyzer for Active Directory >>

WHITE PAPER: Silver Peak Systems, Inc.

Proven Techniques to Cope with Packet Loss
If you have a WAN link with an RTT of 100 ms and packet loss of 1% the throughput is virtually nil. Learn how to overcome this issue in this paper that highlights: - Key WAN characteristics of out of order and lost packets - Packet loss impact on data replication - How MPLS statistics fool network professionals Learn more.

iPhone 5 rumor rollup for week ending Aug. 17
For the iOSphere, reading SEC documents is the modern equivalent of the ancient art of haruspicy, reading animal entrails, to learn the future of the Next iPhone. Much is revealed to the trained eye. Read More

Back-to-school tech guide 2012
Feel that chill? That's not the end of summer approaching; it's the beginning of another school year. With student budgets in mind, we've gathered 10 items -- gadgets, gear and apps -- that'll improve a college student's life, whether in the classroom, in the dorm or around campus. Read More

Scientists find that the Sun is so round, it's scary
If you thought the Sun was round -- you'd be right. But astronomers this week said the Sun is so round it's nearly perfect in its roundness. So round that astronomers said if they scaled it to the size of a beach ball, it would be so round that the difference between the widest and narrow diameters would be much less than the width of a human hair. That's round. Read More

Cloud company ends 'lifetime' hosting promise
Cloud computing company Joyent informed customers this week that a "lifetime" Web hosting offer that it promised more than six years ago would be coming to the end of its life this fall. Read More


WHITE PAPER: Silver Peak Systems, Inc.

3 Main Factors Lowering WAN Throughput
Upgrading bandwidth does not help improve effective throughput when transferring large amounts of data over a high-capacity WAN. This NetForecast report details the problem's culprits and discusses the effectiveness of TCP acceleration, FEC, packet order correction, and WAN optimization. Learn more.

Floods, fires, hurricanes… how do you prepare for data center disasters?
Floods, fires, hurricanes, earthquakes, power surges. There are plenty of disasters that can derail your data center operations. How you prepare for the worst? Do you have a disaster preparedness and response plan in place? How confident are you that your company could recover if a significant disaster were to make your main data center inaccessible? Please take our confidential survey and let us know.... Read More

Twitter's API Changes: What's In It for Users
Changes are coming soon for how third-party applications can use Twitter's application programming interface (API), the software tool an app uses for accessing Twitter content. Read More

Biggest Security Management Challenges for Enterprise Organizations
In the recently-published ESG Research Report, Security Management and Operations: Changes on the Horizon, ESG surveyed 315 security professionals working at North American=based enterprise organizations (i.e. more than 1,000 employees). We asked these folks to define the biggest security management challenges at their organizations. Not surprisingly, the top response (50%) was "budget constraints."... Read More

Antivirus suites struggle to defend against recent exploit-based attacks
Many antivirus suites are incapable of effectively blocking malware attacks against two recent and serious Microsoft vulnerabilities despite the fact that real exploits have been circulating since June, testing organisation NSS Labs has found. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Top Back-to-School Laptops
Do you need to help a family member choose a back-to-school laptop? Are you having trouble deciding what to purchase? Here are some suggestions Read More

FAQ: How to get Windows 8 now ... legally
Starting yesterday, Microsoft began releasing the final code of Windows 8 to developers, IT professionals and businesses that license the company's products in volume. Read More

11 ways around using more spectrum for mobile data
Despite widespread calls for more spectrum to carry mobile data, there is a wide range of technologies already being used or explored that could help to speed up networks or put off the day when more frequencies need to be cleared. Read More

Two services that help protect public Wi-Fi users
If you're using your computer away from your home network -- whether in a coffee shop, at the airport or in a hotel room -- chances are pretty good that your wireless network (even your wired network in a hotel room) is unsecure. Tools like Firesheep and Reaver can easily be used by hackers to find out personal information from Wi-Fi users on the same Wi-Fi network -- you may think that the guy three tables over is just checking his email, but he could be stealing your credit-card information or passwords. Read More

 
 
 

SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Malicious Windows malware 'Shamoon' deletes computer contents, prevents reboot
  2. Scientists set bold plan for future exploration of the sun
  3. Windows 8 RTM available ... I like it!
  4. Department of State cancels large Kindle contract
  5. Android news and rumor roundup for the week ending Aug. 17
  6. Unblinking surveillance stare: Army's 7-story flying football field-sized blimp
  7. AT&T hit by DDoS attack, suffers DNS outage
  8. Cisco answers user questions about upcoming Apple Bonjour Gateway
  9. On to Windows 9: Here are the early details
  10. Android latest platform to drop Flash support
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: