Wednesday 27 April 2011

Microsoft explains its location data collection practices

Is IT Tracking Your Location via Smartphone? | Captain Midnight: 'No regrets' about jamming HBO back in '86

Network World Security

Forward this to a Friend >>>


Microsoft explains its location data collection practices
In the midst of an uproar over ways that Apple and Google collect and store location information from mobile phones, Microsoft has laid out details about its Windows Phone 7 data collection policies. Read More


WEBCAST: Juniper Networks

Securing the Next-generation Datacenter
For the security teams responsible for safeguarding corporate IT assets, these trends present a host of challenges, necessitating several new capabilities and approaches to ensure ongoing, effective security Learn more!

WHITE PAPER: Avaya

Tips to Tailor Your Communications Strategy
An IP-based communications system helps businesses streamline voice and data improving internal productivity and customer service, but one size does not fit all. Answer 4 easy questions to find out the best strategies to meet your unique voice and data communications needs. Read Now

Is IT Tracking Your Location via Smartphone?
Let's say you scored a boondoggle to Los Angeles for a business conference, and instead sneaked off to nearby Disneyland with the family for a vacation on the corporate dime. Or maybe you simply told your boss you were meeting a client, but hit the golf links with your buddies. Read More

Captain Midnight: 'No regrets' about jamming HBO back in '86
John MacDougall, then 25, was the lonely pamphleteer of lore, only instead of paper and ink he was armed with a 30-foot transmission dish, an electronic keyboard, and a burning objection to HBO's decision in 1986 to begin scrambling its satellite signal and charging viewers $12.95 a month.  Read More


WEBCAST: Internap

Weighing Your Options: Colocation or Managed Hosting?
The pressure is on IT to focus on strategic initiatives that move the business forward while reducing costs. Outsourcing aspects of your IT infrastructure can lower costs and enable you to focus on core business competencies. However, with so many options available, weighing your options can be an overwhelming decision. Read More

The Interop history quiz
Interop is coming again to Las Vegas May 8-12 where it will continue its long history of keeping the networking community aligned with new technologies through the trade show itself and the educational sessions surrounding it. Here's a chance to take a look back at some of the major events and also some of the quirky happenings at Interop over the years through a short quiz. Keep track of your score and see how well you did at the end. Read More

Security experts can't verify Iran's claims of new worm
Without a sample of the new worm that an Iranian official says attacked the country's computers, it's impossible to verify his claims, a security research said. Read More


WHITE PAPER: Iron Mountain

Achieving Security with Cloud PC Backup
Read this paper to learn how Iron Mountain's heightened focus on security, privacy, and cost savings, goes beyond simple cloud storage to enterprise cloud security. Read Now!

Oracle fixes Java.com website hole after heads-up from hacker group
The secretive hacker group known as YGN Ethical Hacker Group has done it again, exposing a vulnerability in a vendor website -- this time one owned by Oracle -- through assessment scanning. YGN says Oracle responded promptly to its notification about the vulnerability it found in www.java.com and fixed the hole. Read More

CIA opens secret spy-chest to reveal clandestine writing technology
The CIA has declassified the six oldest documents in its secret vault revealing a host of invisible ink recipes and one way to open sealed envelopes without being caught. Read More

iPhone, iPad users sue Apple over location tracking database
Two Apple customers are suing the company over its iOS location tracking database, charging the data collection violates the federal Computer Fraud and Abuse Act. Read More

Finger pointing? These products get IT off the hook
When communications problems crop up, network pros use performance management and network troubleshooting tools get to the root of the issue. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Fave raves: 22 IT pros name their favorite products
We asked, and IT pros answered. Their favorite IT products keep people productive and enterprise assets safe. Check out the list.

MOST-READ STORIES

  1. Need IPv4 addresses? Get 'em here
  2. Police reply to ACLU about cell phone data extraction devices
  3. Google crushes, shreds old hard drives to prevent data leakage
  4. Fave raves: 22 IT pros name their favorite products
  5. U.S. goes after some game-changing energy projects
  6. Google likely to appeal, and win, Linux patent infringement verdict
  7. State police can suck data out of cell phones in under 2 minutes
  8. Where is Amazon's public apology?
  9. How the Amazon outage set cloud computing back years
  10. Unsecured Wi-Fi router brings federal agents on early morning visit

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment