Search This Blog

Thursday, May 24, 2012

Sales of unused IPv4 addresses gathering steam

9 warning signs of bad IT architecture | Study Finds 1 in 2 Americans are 'Clueless' about Webcam Hacking

Network World Daily News AM

Forward this to a Friend >>>


Sales of unused IPv4 addresses gathering steam
A growing number of U.S. carriers and enterprises are hedging their bets on IPv6 by purchasing blocks of unused IPv4 addresses through official channels or behind-the-scenes dealmaking. Read More


RESOURCE COMPLIMENTS OF: LinkTek

Broken links during data migrations?
LinkFixerPlus is the first application that automatically fixes broken links in Excel, Word, PowerPoint, Access, PDF, PageMaker, AutoCAD, MicroStation and other files when performing data migration due to: server consolidation, server name changes, path name changes or folder reorganizations. Detailed broken link reporting too. Download your FREE trial version NOW!

WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

9 warning signs of bad IT architecture
Chances are someone at some point spent countless brain cycles planning your organization's IT architecture before handing the grand plan off to someone else to build it out, and then to someone else to maintain it as your computing environment inevitably grew. And, chances also are, somewhere along the line, best intentions faded in the face of expediency, departmental politics, and general mismanagement, eroding what was once a coherent architecture management strategy into an ongoing series of independent, case-by-base decisions about each technical component. How do you know if your organization has strayed from the path? Here are nine warning signs that bad IT architecture has taken hold of your organization. Read More

Study Finds 1 in 2 Americans are 'Clueless' about Webcam Hacking
I was surprised to see a CamPatch study that revealed "1 in 2 Americans clueless about webcam hacking." The release called webcam hacking "the latest trend in cybercrime" and stated 51% of laptop users did not know it was possible for a hacker to remotely access and turn on webcams - allowing cybercriminals to secretly watch and record unsuspecting victims." This made me suspiciously look up the company,... Read More

Cellphone vibration syndrome and other signs of tech addiction
There's a growing body of research on phantom cellphone vibrations and the other problems associated with technology obsession, and leading the way is Larry Rosen, the author of iDisorder. IN this Q&A, Rosen talked about how addicted we've become and what we can do about it. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Denver

IT Roadmap Denver: New Sessions
Including: Unified Communications and VOIP, Mobility Strategies, The New Enterprise Network in the Era of the Cloud, Risk Management, Applications Strategy, Reducing IT Cost and Increasing Efficiencies, Analyzing Your Customers for Business Intelligence, and more. So register now and get ready for an all new IT Roadmap in 2012: Click to continue

Supercomputer to connect to 400PB of storage via Ethernet
The National Center for Supercomputing Applications has chosen a massive tape library and disk array system to support of Blue Waters, one of the world's largest supercomputers. Read More

Yahoo launches stand-alone mobile search app
Yahoo beefed up its search offerings on Wednesday when it launched Axis, an HTML5-based browser app that delivers search results as page previews rather than as links. Read More

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make the Read More


WEBCAST: Dell

Today's NAS: A Solution Beyond Old Limits
Traditional NAS systems don't scale beyond fixed limits. Proliferation of NAS systems leads to management challenges. Many organizations also use traditional block-based SAN solutions for transactional systems like databases and email. Having separate block and file storage also adds to management challenges. Learn More

Is your dirty, nasty office making you sick?
A study out today confirms what some people may have suspected - your office environment is a dirty place - and we're not just talking about the usual suspect: the bathroom. According to Kimberly-Clark Professional the place where US workers eat and fix their lunch topped the list of office germ "hot-spots," with sink and microwave door handles found to be the dirtiest surfaces touched by office workers... Read More

The Byte - Google closes deal, Army spy blimp, cancer detection, Lenovo profits
The Byte - Google closes deal, Army spy blimp, cancer detection, Lenovo profits Google closed its deal to acquire Motorola Mobility. Nothrop Grumman is working on a spy blimp that will take flight later this year. A student who created a cancer detection tool won the Intel Science Fair. And more. From: networkworld Views: 56 5 ratings Time: 01:17 More in Science & Technology Read More

10 Social CRM Tools to Help You Keep Tabs on Your Customers
These 10 social customer relationship management (CRM) applications can help your organization monitor, manage and respond to what your customers are saying about you on popular social media sites (and elsewhere). Read More



SLIDESHOWS

Whose high-tech exec job hinges on the presidential election?
There are a ton of high-tech managers and regulators in the federalgovernment who may be changing jobs come November.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. China approves Google acquisition of Motorola Mobility
  2. HP's layoff plans and what they mean
  3. How to avoid 5 common email management mistakes
  4. iPhone 5 rumors for the week ending May 18
  5. Anonymous hater claims responsibility for Pirate Bay DDoS attack
  6. Cisco's wireless unit shifts emphasis to 'mobility'
  7. iPhone 5 said, again, to have 4-inch display
  8. Ethernet switching gets specialized
  9. U.S. report defines China's cybersecurity, space-based threats
  10. Android, Samsung top smartphone sales, topping Apple's iPhone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: