Monday, 4 April 2011

Best Buy, Citibank, JP Morgan Chase, Kroger customers warned after Epsilon marketing firm breach

Get a net-workout with cloud-enabled gym gear | Thieves are stealing children's identities

Network World Daily News AM

Forward this to a Friend >>>


Bank customers warned after breach at Epsilon marketing firm
JP Morgan Chase and the Kroger supermarket chain are warning customers that their names and e-mail addresses may have fallen into the wrong hands after someone broke into computer systems at e-mail marketing giant Epsilon. Read More


WHITE PAPER: Compellent VMware

Seven storage features every VM needs
The key to maximizing your VMware environment is to create a storage environment as flexible as your virtual server environment. Learn how Fluid Data storage from Compellent maximizes VM Storage performance and efficiency, while being a cost-effective solution. Learn more.

WEBCAST: IBM

Solving the Top 4 Network Management Challenges
Join us for this webinar, featuring Jim Frey, Research Director from Enterprise Management Associates (EMA) and Heath Newburn, Program Director from IBM as they discuss Netcool's flexible solutions for a complex and dynamic IT environment. Learn More

Get a net-workout with cloud-enabled gym gear
High-tech gym equipment uses cloud computing to customize workouts Read More

Thieves are stealing children's identities
Identity theft has saddled thousands of children with debt, sometimes for years before they ever discover their personal information has been stolen, a study says. Read More

8 radical ways to cut data center power costs
One or more of these wild-eyed approaches could save you a lot of money -- and not cost you much Read More


WHITE PAPER: Google Postini

Top 5 Drivers for Email Archiving
This paper demonstrates the various reasons to archive email and other electronic content. It discusses how to handle objections, highlights the five key business drivers for archiving, and provides quantifiable justifications that show cost savings and risk reduction. Read now!

RSA hackers exploited Flash zero-day bug
Last month's hack of RSA Security began with an exploit of a then-unpatched vulnerability in Adobe Flash Player. Read More

Aruba rolls out Wi-Fi mesh gear from Azalea deal
Aruba Networks is introducing the first fruits of its acquisition of Azalea Networks this week, boosting the speed of the wireless mesh gear with IEEE 802.11n technology and integrating it into the Aruba MeshOS management system. Read More

Cost of Running an IPv4 Network Will Increase
Many in the industry realize that as we migrate to IPv6 there will be a day when IPv4 is not needed anymore. However, that transition seems daunting and may take decades. In the meantime, organizations will need to maintain both an IPv4 and IPv6 infrastructure adding to the total costs of an IT environment. Over time, the costs of operating an IPv4 network will increase compared to running an IPv6-only... Read More


WEBCAST: IBM

Take Control of Your Network Once and for All
Join this IBM broadcast to learn how to manage and improve network configuration activity to keep your networks running, in compliance and generating revenue. View Now

Apple iOS, Google Android apps tweaked for on-demand, video-like content
Brainshark has unveiled features for its video presentation service to create a more interactive experience for smartphone users. Read More

Internet-connected exercise gear taps the cloud
Smart exercise equipment links to the Internet and taps cloud-based data such as workout goals, health history and nutrition habits to create personalized exercise plans and track how you're doing in the gym. Read More

Comodo compromise expands, hacker talks
The attacker who breached the certificate authority speaks, prompting Comodo to acknowledge that two more of its partners were breached. Read More

New baggage screening system at LAX promises more effcient, safer travel
Los Angeles International Airport stepped up its baggage screening capabilities with the addition of new equipment for checked luggage. Called Siemens Apron Baggage Screening, the system can detect explosives and divert questionable bags for further Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. Robots dive deep underwater to solve airliner crash mystery
  2. Samsung installs keylogger on its laptop computers
  3. 35 years of 'Apple' Fools Day fun
  4. FBI wants public help solving encrypted notes
  5. The hilarious, the not so funny and the even unfunnier
  6. IT "geek squad" wins $319 million Mega Millions lottery
  7. Samsung responds to installation of keylogger on its laptops
  8. Microsoft files antitrust complaint against Google
  9. IE9 tops Firefox 4, if you just ignore all those Windows XP users
  10. 6 outrageous office pranks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment