Search This Blog

Tuesday, May 24, 2011

Winding one's way towards insanity

U.S. international cyberspace policy sounds good; will be hard to implement | Apple of my eye? US fancies a huge metaphor repository

Network World Security Strategies

Forward this to a Friend >>>


Winding one's way towards insanity
Sometimes the best response to annoyance is to laugh. Read More


WHITE PAPER: HP

6 Key Dedupe Challenges
The deduplication market is the fastest segment ofthe storage industry, per IDC. Accordingly, every vendor is telling their version of the deduplication story. With emerging technologies, it is difficult for IT managers to determine what the true IT benefits vs. marketing spin are. Read More Today!

WHITE PAPER: Dell

Converged Communications: People and Applications in Synch
Most small and midsize organizations find implementing unified communications a daunting task, between lack of in-house expertise and complex integration issues, it's easy to back burner this project. Find out how to implement a communications strategy in this Collaboration KnowledgeVault. Learn more

U.S. international cyberspace policy sounds good; will be hard to implement
The ambitious new U.S. strategy for securing the Internet sets critical goals that may be hard to put into practice, experts say, because some of them conflict and pose seemingly insurmountable technical problems. Read More

Apple of my eye? US fancies a huge metaphor repository
Researchers with the US Intelligence Advanced Research Projects Activity want to build a repository of metaphors. You read that right.  Not just American/English metaphors mind you but those of Iranian Farsi, Mexican Spanish and Russian speakers. Read More

Siemens' 'damage control' response to SCADA bug frustrates researcher
Siemens said it intends to fix a vulnerability discovered in its industrial control system products, but the NSS Labs researcher who found the bug says the company seems to be downplaying the seriousness of the problem to save face. Read More


WHITE PAPER: HP & Intel

Avert a Storage Space and Power Crisis
Cornell Medical College was exceeding space and power capacities in its NYC data center. After evaluating storage arrays from multiple vendors, they chose 3PAR to "right-size" their storage and deploy a robust, highly virtualized infrastructure that integrated seamlessly with VMware, reduced their storage footprint and minimized power consumption. Read Now.

Check Point's new security blades cut both ways
If you're in the market for endpoint protection, Check Point's new R80 Unified Endpoint Security Management product shows promise. Read More

Privacy regs won't kill innovation so stop whining
The founder of the Reputation.com Web site criticized Internet industry giants who claim that any regulation to try to protect the privacy of consumers online would stifle innovation. A Microsoft executive at the Privacy Identity Innovation Conference 2011 agreed, but only up to a point, warning that at this early stage in the digital age, the wrong regulation can have "a chilling effect." Read... Read More

7 questions about the Mac malware scare
A few answers help clarify what the MacDefender scareware plague really means for Mac users and administrators Read More


WHITE PAPER: Dell

Optimally Configured Virtualized Environments
Designed for small and midsize businesses, the three reference architectures in this technical document explain how to successfully deploy Dell PowerEdge servers, Hyper-V R2 and Dell EqualLogic iSCSI storage. These proven configurations eliminate trial and error. Learn more.

Everything's a scam ... or so it seems
An editor at Salon recently wrote an excruciatingly candid account of her having been snookered by an Internet scam. Read More

How to stop your executives from being harpooned
'Whaling' is a growing security threat that uses personalized phishing techniques to get your most sensitive data and access to your key networks Read More

PlayStation Network hack will cost Sony $170M
Sony expects the hack of the PlayStation Network and will cost it ¥14 billion (US$170 million) this financial year, it said Monday. Read More

Secure authentication to the cloud
Directories and directory stores featured in a great workshop session I attended at the recent European Identity Conference (EIC), which was also a good place to catch up with an old friend, Michel Prompt -- CEO of Radiant Logic, one of the pioneers in virtual directories. I want to tell you about a new service from Radiant Logic. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows debugging made easy
  2. iPhone 5 rumor rollup for the week ending May 20
  3. 10 things IT groups need to know about The Rapture
  4. Cisco sued for PoE patent infringement
  5. Microsoft: One in 14 downloads is malicious
  6. How to protect smartphones and tablets
  7. Cisco to dump Linksys, WebEx?
  8. IT consultant accidentally live blogs Bin Laden raid
  9. Cisco debuts 'private cloud' controller
  10. Six rising threats from cybercriminals

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Anonymous said...

psjfgnk [url=http://www.lovelovegucci.com/]グッチ アウトレット[/url] vyifixf uidrdaw [url=http://www.lovelovegucci.com/]グッチ 財布[/url] hvxehtj tftvner [url=http://www.lovelovegucci.com/]グッチ 財布 メンズ[/url] cczdyyk xwbpomd [url=http://www.gucciiget.com/]グッチ メンズ[/url] qbospoe wlxjhyk [url=http://www.guccisprings.com/]グッチ 財布[/url] swelnhi nvcucwr [url=http://www.lovelovegucci.com/]グッチ バッグ[/url] ltmaihe dzsvtsy http://www.lovelovegucci.com/ グッチ 財布 メンズ afqfmdk moynvbk http://www.gucciiget.com/ グッチ バッグ bndpvon bvjuwxq [url=http://www.guccisprings.com/]gucci 財布[/url] lusvcqo zandwca [url=http://www.guccisprings.com/]グッチ バッグ[/url] ysizzoe gtddjbi [url=http://www.gucciiget.com/]グッチ 財布[/url] dbqsfbb ukshedp [url=http://www.gucciiget.com/]グッチ アウトレット[/url] rtqrobn vvqhjpm [url=http://www.gucciiget.com/]グッチ バッグ[/url] gwjofgh bomyblr http://www.guccisprings.com/ グッチ 財布 vzegfqx vdtnpnp [url=http://www.guccisprings.com/]グッチ アウトレット[/url] iqxprsb
akhlsrc http://www.gucciiget.com/ グッチ 財布 xcowexf
kxzqcnu http://www.lovelovegucci.com/ グッチ バッグ ngtanvj
xcrmjxw http://www.guccisprings.com/ gucci 財布 aeedwcv