Search This Blog

Wednesday, March 25, 2009

Developers admit biggest mistake on IPv6; Nasty new worm targets home routers, cable modems

H-1B lottery approaches, experts mull TARP effect; Sprint to deploy WiMAX in 10 U.S. cities in 2009
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Oracle
rule

Live Webcast: Maximizing your IT security dollars
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Spotlight Story
Biggest mistake for IPv6: It's not backwards compatible, developers admit

Carolyn Duffy Marsan By Carolyn Duffy Marsan
The Internet engineering community says its biggest mistake in developing IPv6 - a long-anticipated upgrade to the Internet's main communications protocol - is that it lacks backwards compatibility with the existing Internet Protocol, known as IPv4. Read full story

Related News:

News podcast: Network World 360
Microsoft is again delaying the release of the anticipated upgrade to its Identity Lifecycle Manager 2.0 software that has been years in development. Also, AT&T faces an April 4 deadline to negotiate a new labor contract or it will run the risk of a massive labor strike, the Communication Workers of America said this week. (6:29)

Nasty New Worm Targets Home Routers, Cable Modems
A computer worm has been discovered that can infect 55 different home-based routers and DSL/cable modems including common brands like Linksys and Netgear.

H-1B lottery approaches, experts mull TARP effect
Economic conditions could lessen demand for H-1B visas as U.S. government officials work to limit abuse of the program.

Critical flaws found in HP OpenView
Critical vulnerabilities have been found in HP's OpenView product, which could potentially affect millions of organizations currently using the systems and network management software.

New 'scareware' Trojan holds users to ransom
A Trojan that normally peddles bogus antivirus scareware' has hit on a new way of persuading users to part with money for a worthless license - it encrypts their data first.

Sprint to deploy WiMAX in 10 U.S. cities in 2009
Sprint plans to deploy its WiMAX services to 10 major U.S. cities in 2009, with five additional major markets due to get services in 2010.

Put more IT spending in stimulus plans, Obama advisor says
Governments should include more information and communication technology investments in their economic stimulus plans, according to an advisor to President Barack Obama's transition team. But governments must also move quickly to realize the desired short-run stimulus effects of these investments.

Dell workstations tap Intel's Nehalem architecture
New workstation products from vendors such as Dell, Lenovo and Apple are helping shed light on the capabilities of Intel's highly anticipated Nehalem processors.

Expert cites "major problem" with security policy compliance
Attendees at this week's SecureWorld Boston conference got a stern talking-to Wednesday morning: Keynoter Charles Cresson Wood said organizations need to get their information security policies in order or risk going down the tubes

Cisco helps avoid security scrimping in cash-tight times
Many Wi-Fi vendors have integrated dedicated wireless intrusion prevention systems (WIPS) directly into their 802.11n systems. Cisco, for example, recently released an application called Adaptive Wireless IPS integrated with a multifaceted attack correlation system in its Wireless Control System (WCS) network management and security policy platform.

10 operating systems the world left behind
You're not really supposed to love an operating system. It's like your car's hydraulic system, your digestive system or the global financial system. It's supposed to do its job -- and not get in your way while you're doing yours.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Oracle
rule

Live Webcast: Maximizing your IT security dollars
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/25/09

Today's most-read stories:

  1. CEO payday: How much tech chiefs made in '08
  2. Melissa virus turning 10 ... (age of the stripper unknown)
  3. Hidden commands
  4. Linux penguin mascot gives way to Tuz
  5. What is Nortel up to?
  6. 10 great free sites and downloads
  7. Eight great free security tools
  8. Strike looms for AT&T
  9. Microsoft to present open source blueprint for down economy
  10. Microsoft again delays identity management server
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: