Search This Blog

Monday, August 23, 2010

Technology's biggest myths

HP offers $1.6 billion for 3PAR, tops Dell's offer | Top 5 network management investments

Network World Daily News AM

Forward this to a Friend >>>


Technology's biggest myths
As it turns out, Windows Vista really wasn't all that slow; and no, your PC probably won't fry if you open it up without wearing a wrist strap. Thanks in large part to the Internet, the tech world is teeming with lies, half-truths, and misinformation. We've dug up some of the Web's most notorious nuggets of conventional wisdom to see which hold up to scrutiny and which are merely urban legends. Read More


WHITE PAPER: Shoretel

TCO Whitepaper
Comparing competing solutions on equal footing can be difficult. We also know that a system with the lowest purchase price may not have the lowest total cost of ownership (TCO) over the lifespan of the IP unified communications system. To help with your comparison, learn the 12 cost components that must be incorporated in any TCO analysis. Read more!

WHITE PAPER: Red Hat

Planning Guide: SAP to Red Hat Migration
Lower costs and improve performance migrating SAP to Red Hat Enterprise Linux. Download this guide today and discover how you can perform a basic installation and migration in less than 1 day. Examine pre- and post-migration considerations and other upfront planning topics to help avoid potential problems. Read more

HP offers $1.6 billion for 3PAR, tops Dell's offer
Hewlett-Packard has offered to buy 3PAR, a vendor of virtualized storage systems, for $1.6 billion in cash, topping a bid of $1.15 billion made by Dell last Monday. Read More

Top 5 network management investments
The proliferation of virtualization technologies is putting pressure on IT teams to start automating more processes. With little room in the budget for new products, it's critical that companies prioritize their investments. Read More

Free BlackBerry Apps: Nine Torch 9800 Compatible Downloads
It's true, lots of quality BlackBerry apps are not yet available for RIM's latest and greatest: Pandora for BlackBerry; Amazon's Kindle app; LinkedIn for BlackBerry; the list goes on. But I was able to find a handful of great apps that are available. Read More


WHITE PAPER: Gigamon Systems

Gigamon in the Data Center
"Downtime in the data center" is a concept that should be forbidden in any organization. Yet the only way to eliminate that unspeakable word is to prevent it from happening at all. How so? Data Access Switches that allow complete visibility and secure access to monitor and analyze all mission critical data, 24/7. Learn More

Users Advise HP on CEO Search
As Hewlett-Packard looks for a new leader after the sudden departure of Mark Hurd, customers offer their thoughts about how the company should move ahead. Read More

Microsoft pulls a "Facebook" by exposing Windows Live users' names
Users remain outraged that changes in the privacy settings for Windows Live made in June have exposed their names and other data, with no fix in sight. Microsoft also managed to anger users of its free online services by merging friend lists from previously separate online services and by deleting data that didn't comply with revised versions of the tools. Read More

Trojan blamed for Spanish air crash
A plane crash that killed 154 people in 2008 might have been partly connected to the infection of an important ground safety system by malware, a Spanish newspaper has claimed. Read More


WHITE PAPER: HP

Simple Ways to Get the Most from Your Blade Environmen
This technical brief describes the architecture and the implementation of major technologies in the HP Integrity Servers c-Class server blades. The HP Integrity sever blades architecture opens a chapter in server scalability by using a common base 2S (two socket) base blade to build four and eight socket systems. Read Now

Rest in bits
Internet users, and the various communications and social networking services they use, mostly haven't developed protocols to handle the virtual death of someone. Read More

Your Password Policy Stinks
Research has shown that accounts protected by passwords less than 8 characters are about as hard to break into as a safe made out of toilet paper. The minimum password length should between 12 and 16 characters, which means your password policy may need refreshing. Read More

IE 9 under pressure to rebuild Microsoft browser share
Earlier this week, I reported on the operating system share gains for Microsoft Windows 7 as reported by Janco Associates. But the other half of the Janco report measured Web browser share, which I want to address in this post not just for what it says about Internet Explorer, but how it also handicaps rival browsers. Read More

Researcher arrested for alleged voting machine theft
A security researcher who investigated electronic voting machines (EVM) used in Indian elections was arrested by police in Mumbai on Saturday. He is charged with stealing one of the machines, police sources said Monday. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: