Search This Blog

Wednesday, December 21, 2011

iPad 3 rumor rollup for the week ending Dec. 20

  Network World's 2011 Tech News Quiz | Security minefield: 'Bring your own device' will bedevil IT in 2012
 
  Network World Daily News PM

Forward this to a Friend >>>


iPad 3 rumor rollup for the week ending Dec. 20
This week, the iOSphere's fill-in-the-blanks rumoring explains how an explosion at a manufacturing plant that is not yet actually building anything can delay not only the Apple iPad 3 but the iPad 2. Read More


WHITE PAPER: McAfee

Combating the Insider Risk to Data - McAfee Solution Brief
Protecting your organization against internal data threats is not just about protecting the sensitive information you know could put your company at risk if exposed. It's also about discovering those hidden data sources that you don't even know exist and have not secured. Learn More

WHITE PAPER: Quest Software

Key Methods for Managing Complex Database Environments
In this Quest Software white paper, discover what you need to know to successfully manage your complex database infrastructures – and what to look for when choosing the right management solutions for your specific needs. Read it today. Read now!

Network World's 2011 Tech News Quiz
From Lulzsec to Apple patents to AT&T merger proposals, here's the year in multiple-choice questions Read More

Security minefield: 'Bring your own device' will bedevil IT in 2012
The rapid adoption of the newest mobile devices -- especially the Apple iPhone and iPad and the Google Android-based equivalents -- will be a huge disruptive force in enterprise security next year. Not only will there be pressure to decide how to protect and manage these devices, which are growing as malware targets, the complexity of this task is magnified many times over because companies are allowing employees to use their own personal smartphones and tablets for business purposes -- what's sometime called "bring your own device" (BYOD). Read More

Verizon: LTE services "returning to normal"
Verizon says subscribers should expect its LTE services to come back online soon after a nationwide outage knocked them offline this morning. Read More

Microsoft Throws in the Towel on CES
Microsoft has announced that this coming January's appearance will be the last time it appears at the Consumer Electronics Show (CES) as both a keynoter and having a booth presence. However, it's not because the world will end in 365 days. Read More


WHITE PAPER: SonicWALL

Next-Gen Firewall Market Analysis: The SonicWALL Difference
The Next-Generation Firewall (NGFW) is rapidly becoming an essential element of the modern organization's information security strategy. Not only does it restore control over network activity and provide protection against dynamic threats, it also does so while reducing the cost and complexity of network security infrastructure. Learn more.

Chinese hack on U.S. Chamber went undetected for 6 months
Chinese hackers lurked in the U.S. Chamber of Commerce network for six months without being detected, enjoying unrestricted access although it is unknown what information they exploited, according to a published report. Read More

RIM is so popular! Amazon, Microsoft, Nokia have all mulled buyout
Separate reports Wednesday morning show that Research in Motion, despite being battered this year for everything from outages to late products to lost market share, hasn't been without its admirers. Read More

Verizon could soon fall under Uncle Sam's antitrust microscope
It looks as though Verizon's cable spectrum deals won't fly under the radar after all. Read More

Resume Makeover: How an Enterprise Architect Can Become a CIO
Carlton Lassiter began looking for a new job five months ago, after being passed over for a director of strategic planning position with his current employer. Lassiter, who asked CIO.com to use a pseudonym to keep his job search a secret from his employer, currently serves as an enterprise architect with an energy company. His long-term career goal is to become a CIO. He saw the director of strategic planning post as a stepping stone to a CIO position. Read More


WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

Galaxy Nexus: First Android 4 smartphone triumphs -- almost
A gorgeous screen, business-class security, and Android 4 push this smartphone to a new level. Too bad about the several flaws Read More

Mozilla launches Firefox 9, speeds up JavaScript
Mozilla on Tuesday shipped Firefox 9, claiming that the new browser processes JavaScript up to 36% faster than its predecessor. Read More

Top security incidents of 2011
Everyone will agree that 2011 was a busy year in the field of data security, so as the year draws to a close it seems appropriate to begin the process of distilling our experiences into "lessons learned" that we can take into 2012. Read More

The Year in IT Outsourcing, Rating Our 2011 Predictions
We revisit our CIO.com IT outsourcing predictions for 2011 to determine which one were solid hits, which were foul tips, and which were swings and misses. Read More

 
 
 

SLIDESHOWS

10 Things We Love and Hate about Ubuntu Oneiric Ocelot 11.10
Ubuntu 11.10 has some jagged edges and documentation isn't easy to locate, but Canonical is certainly dreaming big with this latest update, dubbed Oneiric (dreamy) Ocelot.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Verizon Wireless outage outraging customers
  2. 5 Facebook Timeline changes you can't wait to make
  3. IBM predicts five big technologies of the future
  4. 25 useful iPad business apps
  5. Gartner: The top strategic technology trends for 2012
  6. Juniper vs. Palo Alto: Next-gen firewall legal brawl
  7. 25 free open source projects IT pros will love
  8. Cisco impresses with UCS
  9. Cloud activity to explode in 2012
  10. Microsoft in 2012: All eyes on Windows 8
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: