Search This Blog

Wednesday, October 21, 2009

Gartner on cloud security: 'Our nightmare scenario is here now'; Verizon chief trashes net neutrality

Verizon chief trashes net neutrality; New Windows Mobile software builds hint at Microsoft's direction
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by BMC
rule

Choosing the Best WLA Vendor for your Environment
Which vendor is leading the job scheduling pack? Learn which company has the best vision for today and tomorrow and which vendor displays the strongest ability to execute on that vision. Get critical tips on finding the best workload automation platform for your organization.

Download this White Paper today!

rule

Spotlight Story
Gartner on cloud security: 'Our nightmare scenario is here now'

Virtualization and cloud computing shaking up the old order, and the customary control is slipping away from security managers as the revolution unfolds. Read full story

Related News:

Verizon chief trashes net neutrality
With the Federal Communications Commission due to vote on new net neutrality rules tomorrow, Verizon Communications CEO Ivan Seidenberg warned the commission against passing rules barring carriers from favoring certain types of content.

New Windows Mobile software builds hint at Microsoft's direction
Though Microsoft's Windows Mobile 6.5 has only just been officially released, newer builds of the operating system are popping up in what are called cooked, modified or hacked ROMs for smartphones. Together, they're being unofficially dubbed version "6.5.1." and seen as a preview of an early 2010 Windows Mobile update, and even a harbinger of Version 7, due later that year.

Windows Mobile 6.5 leaves me un-impressed
I have to admit that since Windows Mobile 2003, I have had a Windows mobile device/Smartphone. Call me a creature of habit but there has been something comforting about having a scaled back Windows OS in my hand.

Inside IBM's Southbury data center
A glimpse inside IBM's sparkling, new 2,000-square-foot facility.

How to Manage Users in Windows 7
A computer running Windows 7 might be used by a single person, by a group of people in an office, or by a family in a home. Fortunately, Windows 7 was designed from the ground up to be a multiuser operating system. The new OS is flexible and can support many different scenarios, with each user having appropriate permissions and a customized environment. Every person using Windows 7 must log in with an account, and each account has a personalized desktop, Start menu, documents folder, history, favorites, and other customizations.

News podcast: Network World 360
IBM is trying to hit Microsoft where it hurts, with a new offering designed to lure customers away from Windows 7, which launches for consumers on Thursday. Also, an AT&T executive has asked employees to post opposition to net neutrality rules being considered by the FCC on an FCC Web site using their personal e-mail addresses, prompting accusations of unfair advocacy by an opposing group. (6:49)

HP's CEO: Some clouds not ready for prime time
Hewlett-Packard CEO Mark Hurd is raising issues with cloud computing, on everything from its name to its ability to offer a secure environment.

Windows 7 nabs Amazon's top sales spot
Just hours before Microsoft is set to launch Windows 7, the new operating system has jumped to the top of the software bestseller list at online retailer Amazon.com, and accounts for three of the first five spots and five of the top 10.

FAQ: How to prep for an XP-to-Windows 7 upgrade
With Windows 7's launch fast approaching, it's time to start thinking about how to prepare your aging-but-still useful PC running Windows XP for that OS upgrade you're dying to make.

Coffins in the mail are a trick of the cybercrime trade
There's never been a better time to get involved in cybercrime.

Facial-recognition system can guess your age
Those advertising in public places would really like to know the age and gender of those viewing their ads to see if they're hitting the right demographic. An experimental facial-recognition system developed by NEC does a pretty good job of delivering just that information.

Two out of five at risk from Wi-Fi hijacking
Two out of five web users are at risk of having their Wi-Fi connection hijacked, says TalkTalk.

Open source security project could get a boost with Metasploit buy
Rapid7 is buying Metasploit, and promising to advance open source penetration testing and the Metasploit Project, which develops exploits against known vulnerabilities.

Goodbye steering wheel, here comes drive-by-joystick
Today it's the stuff of video games but Toyota is experimenting with joystick control for a new breed of compact cars and transporters. The world's biggest car maker built the technology into a couple of concept vehicles that were on display Wednesday at the Tokyo Motor Show.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now


Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More

 

October 21, 2009

MOST-READ STORIES

  1. IBM takes aim at Windows 7 with new desktop offering
  2. The top 7 roadkill victims on the journey to Windows 7
  3. Reports: Google to launch music service and phone
  4. Goodbye steering wheel, here comes drive-by-joystick
  5. Verizon fires shots across iPhone's bow with Droid smartphone
  6. Deck out your home office
  7. Facebook for scientists gets millions in funding
  8. Cisco unveils new generation of branch routers
  9. What the heck are you doing on the Internet at that hour?
  10. Ballmer takes on SharePoint future, software licensing issues, Sidekick woes

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.
Register now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: