Search This Blog

Tuesday, November 30, 2010

P2P-based alternative to DNS hopes to challenge ICANN

Is Apple really targeting enterprise mobility? | AT&T goes after copper wire thieves

Network World Daily News PM

Forward this to a Friend >>>


P2P-based alternative to DNS hopes to challenge ICANN
A group led by former Pirate Bay spokesman Peter Sunde is forming to develop a peer-to-peer-based alternative to today's ICANN-controlled DNS system, according to a blog posted on Tuesday. Read More


WEBCAST: Iron Mountain

Secure, automatic protection for all your server data
Your data is valuable—too valuable to risk losing through unreliable backup methods. Iron Mountain's LiveVault offers secure, easy, automated online backup for servers throughout your organization. Watch this webcast to learn how to eliminate the risks of tape-based backup while gaining scalability and fast, reliable recovery. View now

WHITE PAPER: Sprint

Next Wave of Growth for Unified Communications
Today's enterprise is undergoing a significant transformation, moving toward becoming a true Anywhere Enterprise®—a company where the workers can access any information from any device over any network. Enterprise mobility has been a crucial component in kicking off the evolutionary process. Learn More

Is Apple really targeting enterprise mobility?
Gartner mobile analyst Nick Jones says Apple plans to give new attention to the enterprise market in 2011. The analyst group, and enterprise users have complained for years that Apple hasn't been "enterprise friendly." Read More

AT&T goes after copper wire thieves
Copper thieves targeting Atlanta are now being targeted themselves by AT&T which is now offering $3,000 for information leading to their arrest. Read More

Find us on Facebook
If you're on Facebook, give Network World's Facebook page a "like" and get just the top items in your news feed. Read More


WHITE PAPER: Websense, Inc.

Buyers Guide to Data Loss Prevention Solutions
This guide provides a list of recommended features and capabilities for buyers to consider when purchasing a DLP solution. Buyers can also use this guide to develop requests for proposals, as well as to help differentiate one vendor's products from another during demonstrations and proof-of-concepts. Read More

Massive Windows Phone 7 Update Rumored for January
Windows Phone 7 early adopters won't have to wait long to get some major missing features, according to the latest murmurs. Read More

Verizon set to disclose LTE details Wednesday
Verizon Wireless is scheduled to disclose details tomorrow of its plan to launch a LTE 4G wireless network in 38 U.S. cities. Read More

Welcome to Browser War III, Brought To You By Open Source
The shots are really flying in Browser War III, the mother of all browser wars. In this version of the browser war, open source is playing the part of the arms dealer, giving all of the combatants the ammunition to fight. Read More


WHITE PAPER: Emerson Network Power

A Framework to Visualize the Data Center
Increasing rack density makes it critical to understand environmental characteristics around weight, heating, cooling and power. Flat-file data center planning and management tools can't Read Now

Fortinet unveils high-speed security blade for Fortigate-5000 chassis
Fortinet today introduced a high-speed security blade that combines a slew of capabilities -- including firewall, VPN, intrusion prevention, identity-based application controls, anti-virus, anti-spam and Web filtering -- and delivers up to 40G bit/sec throughput. Read More

Wireless bundle to bring contactless payments to mobile devices
Inside Contactless has announced a new packaging of its NFC silicon and firmware with a third-party security controller. The combination promises a complete system for secure mobile payments that can be easily integrated into a smartphone or tablet. Read More

iPad, WikiLeaks, Chatroulette among top AOL search terms for 2010
Apple's iPad and iPhone dominated AOL's list of year-end hot shopping search terms, though technology terms had a fairly weak showing on AOL's overall hot searches list, which beats the rush of year-end trend reports by coming out at the end of November. Read More

The EU's Google Investigation: A Breakdown
The European Union has begun its investigation into Google's supposed antitrust violations. The inquiry -- being conducted by the European Commission, the regulatory arm of the EU, and based on complaints by competitive search-related companies -- accuses Google of "unfavorable treatment of their services in Google's unpaid and sponsored search results," the European Commission said in a statement. Here's a breakdown. Read More

Groups vow to fight gov't takedowns of websites
The EFF and a website owner vow to fight domain name seizures by two U.S. government agencies trying to fight copyright infringement. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Five reasons to be grumpy about 2010
  2. EFF backs red-faced porn watchers vs. copyright trolls
  3. Best networking tweaks for Linux
  4. 10 weirdest celebrity tech ads
  5. Help those with personal cyberstalking terrorists
  6. Inside the labs at Microsoft, HP and IBM
  7. WikiLeaks: China was behind Google hack
  8. Comcast outage encourages DIY DNS fix for some
  9. 10 things we love about Lync 2010
  10. Report says Apple iPad 2 to have two cameras, USB port

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: