Search This Blog

Saturday, February 25, 2012

10 Must-Read Network World stories for the weekend

OK Cisco, we get it | The Windows 8 Quiz

Network World Daily News AM

Forward this to a Friend >>>


Network operators get serious about Wi-Fi
At Mobile World Congress, vendors and carriers will lay out a new future for Wi-Fi connectivity and services, one that's disciplined, convenient, reliable...and billable. Read More


WHITE PAPER: Juniper

Security Best Practices for the Mobile Enterprise
The proliferation of mobile devices is having a profound impact on network security. This white paper highlights how changes in user mobility are affecting security requirements in the unwired enterprise, and outlines best practices for controlling access within and beyond perimeter protections. View Now

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

OK Cisco, we get it
There is such a thing as over-marketing. And over-marketing can be dangerous. Anyone who cries "Wolf!" over and over again, or who repeatedly claims he or she is not something or other is likely to be eventually disbelieved and tuned out altogether. Read More

The Windows 8 Quiz
Microsoft's latest operating system is due out soon, how much do you know about Windows 8? Read More

iPad 3 rumor rollup for the week of Feb. 21
In the real world, leaks cause you to sink but in the iOSsphere they cause you to float, higher and higher. With iPad 3, a news leak is anything that confirms your own thinking or longing. This week, the iOSsphere longs for a smaller iPad, Retina Display, revelations of the secret Apple supply chain, and savors the subtlest of differences with iPad 2. Read More


WHITE PAPER: Oracle

Copying Sensitive Data Into Non-Production Environments
Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach. Learn More!

How to go hybrid
When online marketing firm Hubspot started in 2006, the company's IT needs were not very taxing, but they expanded quickly as the company realized success. Read More

Carrier Ethernet 2.0 aims for global connectivity
The Metro Ethernet Forum has updated its Carrier Ethernet specification, hoping to standardize the use of Ethernet for global multicarrier services. Read More

Battle of the cheap tablets: Nook Tablet vs. Kindle Fire
Barnes & Noble's new Nook Tablet is pretty similar to Amazon's Kindle Fire and you suspect that B&N took a look at the Fire's success and said to their Nook e-reader engineers, "We need a $199 Android tablet, stat!" Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

The BYOD struggle: From writing custom apps to defining security
Companies are grappling with the question of whether and how to let employees use their own smartphones and tablets at work even as a huge push is being made to set up internal "app stores" of approved and custom-built corporate mobile apps. Read More

Quad-core smartphones and tablets will soon get LTE
Nvidia has partnered with modem chip makers GCT Semiconductor and Renesas Mobile to make it easier to build LTE (Long-Term Evolution) smartphones and tablets using its quad-core Tegra 3 processor, the company said on Thursday. Read More

How to Build Multiple Layers of Security for Your Small Business
The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Windows 8 logo hacked to Chinese Web site
  2. Cisco: Customers drove us to block Microsoft/Skype
  3. Carrier Ethernet 2.0 aims for global connectivity
  4. Apple's 30th birthday salute to Steve Jobs knocked off YouTube
  5. Police warn of money-stealing computer virus
  6. Five bone-headed ways stupid people will use Google Goggles
  7. iPad 3 rumor rollup for the week of Feb. 21
  8. OK Cisco, we get it
  9. A guide to tablets, great and small
  10. Hacker steals 1 million user logins from YouPorn website

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: