Wednesday, November 30, 2011

How do you keep your security workforce?

  Researchers use Woodpecker to single out vulnerable Android phones | The Inside Story of Why Puma Dumped Four Cloud Vendors for One
 
  Network World Daily News PM

Forward this to a Friend >>>


How do you keep your security workforce?
Recruiting and retaining important IT staff -- particularly in the burgeoning security arena -- is a challenge for every organization and one that is only going to tougher. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

WHITE PAPER: Oracle

Application Upgrades and Service Oriented Architecture
A study by SOA Industry Analyst Zapthink shows that maintenance and change costs of SOA-based integrations, architected properly, are dramatically lower than traditional integration approaches. Read this whitepaper to understand why and how SOA-enablement will reduce cost and risk of Application upgrades for your organization. Learn More Today!

Researchers use Woodpecker to single out vulnerable Android phones
North Carolina State University researchers say some Android smartphone makers' efforts to go above and beyond the Google mobile platform's basics open their devices to security breaches. Read More

The Inside Story of Why Puma Dumped Four Cloud Vendors for One
Puma simplified its cloud strategy and saved money by consolidating from using four cloud vendors down to just one. Here's what they did and why they did it. Read More

Cyber Monday sales break record, surpass $1.25 billion
Consumers took advantage of Cyber Monday deals, racking up $1.25 billion worth of online purchases on the first business day of the week following Thanksgiving. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Google Translate glitch opens security hole
Developers moving to the upcoming paid version of Google Translate need to follow the documentation so their implementation of the package doesn't lead them to paying for someone else's use of the platform. Read More

Start-up Agari debuts with security to stop fake e-mail, phishing attacks
Start-up Agari debuts today with cloud-based e-mail security services aimed at allowing enterprises and e-commerce companies to identify and block fake and spoofed e-mail exploiting their legitimate business domain names to conduct scams and phishing attacks. Read More

iPad 3 rumor rollup for the week of Nov. 28
Pray that Apple doesn't release the iPad 2S instead of iPad 3. The iOSsphere is pulsing with rumors about a new technology for a high-definition display on the Next iPad; seething over an arcane listing of "new" iPads in an arcane iOS list; and pondering winning stock strategies to exploit the upside iPad 3 will surely usher in. Read More


WHITE PAPER: HP & Intel

Finding the right cloud solutions for your organization
Today's Instant-On Enterprises need to think differently about how they source and deliver services that are enabled by technology. They need to take advantage of a hybrid delivery model—one that truly optimizes the mix between traditional IT, private cloud, and public cloud. Learn more

They're never too young to learn about passwords
That the little girl had a netbook was slightly surprising, given that she couldn't have been older than seven or eight. But her conversation with her Mom about the machine - overheard at my son's basketball practice -- wasn't surprising at all, unfortunately. "Mommy, my password isn't working." (Hands netbook to Mom.) "What's your password again, sweetie?" "Password." Read More

Gumby-bot wriggles from Harvard University labs
Harvard University researchers have demonstrated a flexible new soft robot that borrows from the movements of squid, worms and other creatures to maneuver through tight spaces. The 5-inch robot is less susceptible to falls or smashing into things than hard-bodied robots, but would be more likely to suffer a puncture. Researchers are still working on how to enable such robots to move without an external... Read More

Google Music vs. Amazon Cloud Player: How They Stack Up
The newest player in the cloud-based music space -- Google Music -- is stirring the pot with a number of competitive specs. How does it stack up to Amazon's popular Cloud Player? CIO.com's Kristin Burnham takes a look. Read More

Steve Jobs' worth, iPhone 5's arrival among 2011's top online question topics
Natural disasters -- the Japan earthquake and Hurricane Irene -- have spurred the most online news searches in 2011, though big news and rumors about Apple weren't far behind. Read More

 
 
 

SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Facebook under privacy watch for 20 years
  2. Hackers target IPv6
  3. 25 free open source projects IT pros will love
  4. iPhone self-combusts over Australian skies
  5. Cisco, Juniper, Check Point, Palo Alto among firms in security contest
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Hackers launch millions of Java exploits, says Microsoft
  8. Cisco tells HP to lose that suit
  9. RIM to offer multiplatform device management
  10. Free software activists to take on Google with new free search engine
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

25 free open source projects IT pros will love

  CIO Q&A: How Citrix supports more workers with lower IT budget | Desire for Windows 8 tablet shrinking, Forrester says
 
  Network World Network/Systems Management

Forward this to a Friend >>>


25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known SourceForge projects he thinks IT folks will love. Here are his picks, along with a few of our own. Read More


RESOURCE COMPLIMENTS OF: Alcatel-Lucent

Discover the new currency for the networked-community age
Alcatel-Lucent's Allison Cerra and Christina James spent a year pursuing the essence of identity in the virtual world and beyond. With Identity Shift, they examine how technology, identity and expectations intersect, offering a compelling look at how we present and protect ourselves, build trust, and find value in the networked-community age. Click to continue

WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

CIO Q&A: How Citrix supports more workers with lower IT budget
Citrix CIO Paul Martine is the poster child for everything that Citrix markets to other CIOs. Read More

Desire for Windows 8 tablet shrinking, Forrester says
Interest in tablets with Microsoft's Windows 8 is plummeting, Forrester Research says. Read More

Two-thirds of firewall managers lack confidence in their security posture
In its annual firewall management survey, Tufin Technologies uncovered some disheartening details. For example, 1 in 4 firewall managers have never conducted an audit, and 66% of the managers think their processes put them at risk of a security breach. The alarm is sounding for a giant wake-up call. Read More


WHITE PAPER: Splice Communications

The Real Cost of Dealing with Carriers
What is the TCO for your company's data network services and solutions? If you work with one of the large carriers, it's probably a lot higher than you think. Read Now!

Microsoft: Office 365 a hit, especially with small businesses
Office 365, Microsoft's cloud collaboration and communication suite for organizations, is selling eight times faster than its predecessor, the Business Productivity Online Suite (BPOS), and has been particularly successful among small businesses, which make up over 90% of its customer base, the company announced on Tuesday. Read More

Mohawk Fine Papers builds integration-in-the-cloud
Just two weeks after Mohawk Fine Papers made the decision to sell its products on Amazon.com, integration work was complete, connections to its ERP system lit up and sales started rolling in. "Amazon generated tens of thousands of dollars in revenue immediately," says Paul Stamas, vice president of IT at the $83 million, 725-employee manufacturer of premium papers. Read More

Survey: IT certifications lead to jobs, higher pay
In this survey of 700 IT professionals, most say certifications have led to raises and better jobs, busting the myth that certs are nothing but a scam. Read More


WHITE PAPER: Quest Software

Create a Solid Backup Strategy
The simpler a backup plan is to plan and execute, the more likely it is to be done. Read Now!

NetApp, Iron Mountain team up on medical archive service
NetApp is teaming up with Iron Mountain to offer its StorageGRID object storage software with two Iron Mountain medical data archiving services: the Digital Record Center for Medical Images and its vendor-neutral archive offering. Read More

HP pairs Autonomy and Vertica software
Hewlett-Packard is quickly putting to use its recent acquisitions of Autonomy and Vertica, integrating the software from these companies into a single software package, called the HP Next Generation Information Platform. Read More

Customer sues Epicor after ERP software project attempt ends in 'big mess'
A would-be Epicor customer is taking the ERP (enterprise resource planning) vendor to court over a "big mess" of a software project that it says ended up battering its bottom line instead of improving operations. Read More

 
 
 

SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 25 free open source projects IT pros will love
  2. Free software activists to take on Google with new free search engine
  3. iPhone self-combusts over Australian skies
  4. Cisco tells HP to lose that suit
  5. Hackers target IPv6
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Privacy to be punted again when 'balanced' against need for govt spying
  8. Open source tools for worship
  9. Cisco reorgs again, folds net management into new cloud group
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Network World Whitepapers Download: November 30, 2011

  A Glimpse into IBM's Collaboration Future | FireEye 1H 2011 Advanced Threat Report
 
  Network World Whitepapers Download

WHITE PAPER: IBM
A Glimpse into IBM's Collaboration Future
This white paper focuses on the evolution of Notes and Domino and highlights the broader shift in the collaboration market toward a blending of traditional collaboration services with newer social constructs and business applications—all accessible via mobiles, browsers and rich clients. Read Now


 

WHITE PAPER: FireEye
FireEye 1H 2011 Advanced Threat Report
The Advanced Threat Report is a technical look into the trends cyber criminals are employing to bypass traditional security. In the most recent semi-annual report from FireEye, they find that 99% of organizations are facing significant malware infections that have penetrated NGFW, IPS, AV, and Web gateways. Read now!


 

WHITE PAPER: Citrix
8 Reasons Why Citrix Beats F5
Is your network ready for the Cloud? Not with F5. Shift to Citrix NetScaler. Shift up to the Cloud. Download 8 Reasons Citrix NetScaler beats F5. Read now


 

WHITE PAPER: AMD
Business at the Speed of Virtualization
Enterprises increasingly rely on technology to serve as the enablers and accelerators of the business—not just to reduce costs but also to empower new business initiatives and increase the top line. Learn More!


 

WHITE PAPER: SonicWALL
10 Ways to Securely Optimize Your Network
Learn 10 ways SonicWALL solutions can help optimize performance, enhance security, and increase employee productivity, without introducing latency. Read now.


 

 

Forward this to a Friend >>>

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_whitepapers_download_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

12 valuable tools for managing business Macs

Cisco data center forecast very cloudy | HP LaserJet printers vulnerable to attacks, researchers warn

Network World Daily News AM

Forward this to a Friend >>>


12 valuable tools for managing business Macs
The knock on managing Macs in business environments has long been Apple's ambivalent attitude toward providing significant enterprise support. Apple does, of course, offer tools for deploying, configuring, and managing Macs. But to move Macs beyond a departmental setting, IT will often find it necessary to look to third parties for help. Read More


RESOURCE COMPLIMENTS OF: Quest Software, Inc.

Free Network Monitoring
Ready to improve network performance and efficiency - for free? You need Foglight NMS. It's powerful, robust, highly scalable and easy to use. And now, you can download it to monitor your network (up to 100 devices) for no cost whatsoever! Get your copy today.

WEBCAST: Cisco Systems, Inc.

Register for Cisco's cloud 12/6 webcast.
See how Cisco helps build complete cloud networks. Learn how we are helping deploy solutions that meet your organization's needs while navigating within, between, and beyond the clouds. Gain insight from industry leaders on using innovative cloud business models by registering for our December 6 webcast. Click to continue

Cisco data center forecast very cloudy
Global cloud computing traffic will grow 12-fold from now to 2015, according to a new Cisco study. Read More

HP LaserJet printers vulnerable to attacks, researchers warn
Millions of HP LaserJet printers contain a security weakness that could allow attackers to take control of the systems, steal data from them and issue commands that could cause them to overheat, according to two researchers from Columbia University. Read More

FCC riles AT&T by releasing report on T-Mobile merger
The U.S. Federal Communications Commission has allowed AT&T to withdraw its application to buy the mobile licenses owned by T-Mobile USA, as AT&T had requested, but the agency has also released a staff report that disputes many of the benefits the two mobile carriers claimed the merger would produce. Read More

Privacy groups generally cheer FTC's Facebook settlement
Privacy and technology groups generally applauded a wide-ranging settlement between Facebook and the U.S. Federal Trade Commission over the social-networking site's privacy practices. Read More


WHITE PAPER: Sybase

Scaling Out Query Performance with Sybase IQ 15.3
This paper is meant to provide a holistic perspective and introduce the technical concepts behind DQP in general and Sybase® IQ 15.3's DQP implementation through the PlexQ Distributed Query Platform. Read now.

Hackers launch millions of Java exploits, says Microsoft
Hackers continue to launch attacks exploiting vulnerabilities in Oracle's Java software in record numbers, Microsoft said. Read More

Lawmaker dissatisfied with Amazon's answers on Kindle Fire's data harvesting
Amazon told a Massachusetts congressman that the Silk browser in its Kindle Fire tablet doesn't pose a privacy threat to consumers, but the lawmaker wasn't ready to give the online retailer a pass. Read More

MobileIron's management software prepares for Android
MobileIron hopes to help businesses prepare for what it believes will be an onslaught of Android phones in 2012 with an updated version of its mobile device management software. Read More

Health & Fitness Tech Treasures [2011 Cool Yule Tools]
Making a big comeback in this year's holiday gift guide is the health and fitness category. Whether you're just starting out on the path of exercise, or are a seasoned athlete, the number of consumer electronics products dedicated to a person's health has increased steadily over the past few years. Here are some of our favorites that can make a good gift under the tree for your favorite fitness enthusiast: Read More


WHITE PAPER: BMC

Managing Cloud Services from Request to Retirement
This lifecycle is tailored to the needs of the business, with both the flexibility to deliver the full required software stacks and the management rigor to ensure the operational integrity of the cloud. Learn More!

Another SCADA threat? Well, only if you count white-lighting as a hazard
After this month's now disputed cyber-attack on an Illinois water authority site, you can't blame the utility industry for being a bit under stress. Perhaps such stress relief was what one water department employee had in mind when he allegedly set up a moonshine operation using the Groton, Mass., water supply facility. Read More

Researchers address dirty little secret of mobile phones in Africa
While it's well known that many developing countries are bypassing the setup of major wired telecom infrastructure and going straight to mobile networks, it's less commonly known that a huge obstacle to using these wireless networks is a lack of access to the power grid by end users. Read More

Google Maps app for Android adds indoor floorplans
Disoriented at Minneapolis' Mall of America? Confused at Tokyo's Narita airport? Can't find the bathrooms at your local Ikea store? The Google Maps application for Android phones and tablets may offer some help. Read More

It's a Small World: Facebook Slices Separation to 4.74 Degrees
According to a new study by Facebook, the social network has cut the degrees of separation between people from six to 4.74, making the world of Facebook smaller than it may seem. Take that, Kevin Bacon. Read More



SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 25 free open source projects IT pros will love
  2. Free software activists to take on Google with new free search engine
  3. iPhone self-combusts over Australian skies
  4. Cisco tells HP to lose that suit
  5. Hackers target IPv6
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Privacy to be punted again when 'balanced' against need for govt spying
  8. Open source tools for worship
  9. Cisco reorgs again, folds net management into new cloud group
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **