Search This Blog

Wednesday, July 29, 2009

Microsoft-Yahoo deal will change cloud landscape; iPhone SMS attack to be unleashed at Black Hat

iPhone SMS attack to be unleashed at Black Hat; What business is Cisco in today?
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sybase
rule

Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.

rule

Spotlight Story
Microsoft, Yahoo search deal will change cloud app landscape

After a year and a half of negotiating, Microsoft and Yahoo finally announced a search deal partnership. Redmond's new search engine, Bing, will become Yahoo's search platform. Yahoo's sales force will be in charge of handling both companies' search advertisers. Read full story

Related News:

iPhone SMS attack to be unleashed at Black Hat
Apple has just over a day left to patch a bug in it's iPhone software that could let hackers take over the iPhone, just by sending out and SMS (Short Message Service) message.

What business is Cisco in today?
This week in an open letter to Cisco CEO John Chambers, Global CIO Senior VP and Director - Bob Evans asked the oversimplified question: What business is Cisco in today?

Sprint gains 777,000 prepaid subscribers, but overall subscriptions still falling
Sprint added 777,000 prepaid wireless subscribers to its ranks in 2Q, but suffered a net loss of 257,000 wireless subscribers for the quarter.

Extra '&' in Microsoft development code gave hackers IE exploit
Microsoft on Tuesday confirmed that a single superfluous character in its own development code is responsible for the bug that has let hackers exploit Internet Explorer (IE) since early July.

Video: Microsoft rushes to fix IE kill-bit bypass attack
At Black Hat this week researchers will show a way to bypass kill-bits; Microsoft is releasing a patch for the bug on Tuesday

Security vendor McAfee spills 1,400 customer names
In a story just dripping with irony, e-mail security vendor McAfee has accidentally sent the contact details of some1400 conference attendees in a spreadsheet attached to a thank you message.

Android Needs More Developer Evangelists
This past weekend featured a bit of a dust-up in the Android blogging community. Tactically, the issue was one of confusion between Donut (the development branch in the Android open source repositories) and Donut (the code-name for an update to Android). Strategically, the issue really centers around Google's role in building a developer ecosystem around Android.

E-mail stream spammier than ever, reports say
Spam as a percentage of all e-mail has reached an all-time high, according to two security firms releasing their periodic threat reports Wednesday.

U.S. supercomputing lead rings Sputnik-like alarm for Russia
Russia's launch of Sputnik in 1957 triggered a crisis of confidence in the U.S. that helped drive the creation of a space program. Now, Russia is comparing the U.S.'s achievements in supercomputing with theirs, and they don't like what they see.

Reddit readers will enjoy this video
The two-and-a-half-minute video is here (don't miss the MJ shout-out near the end). As might be expected, they are discussing the tribute over at Reddit in the typical Reddit style.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Watch this space
IT quizHere are 11 security companies to watch.

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Learn More


 

July 29, 2009

TOP STORIES | MOST DUGG STORIES

  1. Black Hat's most notorious incidents
  2. 7 half-truths about virtualization
  3. Low-tech Internet scams net big money
  4. Tweet prompts libel suit
  5. Microsoft rushes patch for 'deep' bug
  6. America's 10 most wanted botnets
  7. Broken iPhones
  8. 10 cutting edge spy gadgets
  9. Apple jettisoning Google Voice
  10. Five technologies Iran is using to censor the Web

Next-Generation Data Centers
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.
Read this Guide.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: