Thursday, July 28, 2011

Google, Facebook, others to IETF: Who's using IPv6?

  'War texting' lets hackers unlock car doors via SMS | IEEE sets standard for 'white spaces' networking at up to 22 Mbps
 
  Computerworld Networking

Forward this to a Friend >>>


Google, Facebook, others to IETF: Who's using IPv6?
Where are the users? That's what popular websites including Yahoo, Google and Facebook are asking the Internet engineering community when they are questioned about their long-range plans to deploy IPv6. Read More


WHITE PAPER: Mimecast

Thinking about Migrating to Microsoft Exchange 2010?
This informative guide details the best practices to follow when migrating from Microsoft Exchange 2003 to Microsoft Exchange 2010 specifically explaining how to prepare the existing infrastructure, what safeguards to employ before beginning, and how to perform the actual migration. Read now

RESOURCE COMPLIMENTS OF: SAP

The Real-time Value of BI
Today's top performing organizations have developed a strategy to manage growth in data volume & complexity while exploiting that data to create quicker business insight. Learn how best-in-class companies are delivering broader access to information in a shorter timeframe to facilitate substantial improvement in key business performance metrics. Click to continue

'War texting' lets hackers unlock car doors via SMS
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners. Read More

IEEE sets standard for 'white spaces' networking at up to 22 Mbps
A just-published standard for using the abandoned "white spaces" between TV channels could offer wireless networking at speeds of as much as 22 Mbps over distances as great as 62 miles. Read More

How to implement IPv6 in a Windows environment: A guide
By now, you've heard that ARIN has (more or less) run out of IPv4 addresses and the time has come for mass migration to IPv6. If you are a Windows shop, the good news is that Microsoft has been preparing for IPv6 for years and almost all of the latest Microsoft wares support it. Some, such as Windows Server 2008 R2, depend heavily on it for certain features. (Insider: registration required) Read More


WHITE PAPER: Riverbed

Accelerating Cloud Performance with WAN Optimization
Today's smart CIOs are assessing their workloads against business needs and analyzing where each should run—locally or in the public cloud. Read on to learn about the benefits of cloud computing, and why its success or failure is often dependent on WAN optimization. Learn more.

Universities launch ultra-high-speed broadband initiative
A group of 29 universities will seek ideas on how to improve broadband speeds at their campuses and surrounding communities. Read More

IT security's scariest acronym: BYOD, bring your own device
The torrent of smartphones and tablets entering companies has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and new security risks, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too! Read More

Darlene Storm: Alleged LulzSec arrested, but Anonymous #OpPayPal makes eBay bleed $1B stock loss
Alleged LulzSec members arrested as #OpPayPal puts the serious hurt to PayPal parent company eBay which is bleeding money as stocks plummet. People are closing their PayPal accounts in support of Anonymous using legal activism. Accusations fly on Twitter about censoring the operation. Read More

Darragh Delaney: File and database activity monitoring
When I started my career in network management many years ago, my primary focus with file sharing and database applications was to make sure that they had enough disk space to grow. This basic level of monitoring is still important today. However, due the amount and sensitivity of data on today's networks, this basic monitoring has being extended and is now being referred to as FAM (file activity management) and DAM (database activity management). Read More

 
 
 

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Google is adjusting the real-name policy of its Google+ social service to appease angry users -- many kicked off without notice. But Google will still not allow pseudonyms. Is this a good policy?

Is Google+ being too pedantic about using real names?

COMPUTERWORLD'S TOP GREEN-IT ORGANIZATIONS

Computerworld is identifying the top organizations leading the way with green IT. We're seeking input from organizations that are both reducing energy consumption in their IT equipment and using technology to conserve energy and lower carbon emissions.

Please fill out our short survey, or forward this link to the person in your company best able to answer questions about IT energy issues. The deadline for surveys has been extended to Monday, July 25.

SHARK TANK OF THE DAY

Dog, meet pony

This pilot fish is a trainer at a software vendor that creates products for the communications industry -- and it's in trouble because the new release that customers are clamoring for is perpetually delayed.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan3511@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:14 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive