Group to examine cloud standards

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Group to examine cloud standards


Group to examine cloud standards

Posted: 29 Jun 2010 09:00 AM PDT


Last week I had the opportunity to participate in the "Cloudchasers" series of podcasts hosted by noted raconteur Mathew T. Grant. This one included Ajay Sharma, the product marketing manager for identity management at Novell, and myself talking about "Identity and the enterprise cloud."

Freebie JonDo Protects Your Identity Online

Posted: 29 Jun 2010 09:00 AM PDT


JonDo (free) anonymizes your connections using a proxy service, so that a Web site or other Internet destination won't be able to see where you're really coming from. But while the software is free, and there's also a free level of service, it'll still cost you a good deal of connection speed.

HP consolidates, protects data centers

Posted: 29 Jun 2010 09:00 AM PDT


HP this week unveiled data center switching and security products designed to simplify server connectivity and protect data in a converged infrastructure.

Hackers vandalise 200 web sites, cripple 150

Posted: 29 Jun 2010 09:00 AM PDT


The web sites of more than a whopping 200 Australian organisations were hijacked and vandalised in a spate of hacks last week.

HP draws on Avaya as a unified communications partner vs. Cisco

Posted: 29 Jun 2010 09:00 AM PDT


HP has brought Avaya into its alliance partners program in a move that will help it compete against Cisco by offering more choices to customers interested in unified communications and contact centers.

Asian SMBs focused on protecting their information

Posted: 28 Jun 2010 09:00 AM PDT


Small and mid-sized businesses (SMBs with 10 to 499 employees) are now focused on making protecting their information their highest IT priority, according to Symantec.

Social networks leak your information, study says

Posted: 28 Jun 2010 09:00 AM PDT


A study finds that shows that mobile social networks are giving data about users' physical locations to tracking sites and other social networking services.

You Are Here: Scary New Location Privacy Risks

Posted: 28 Jun 2010 09:00 AM PDT


Location-based services on a mobile phone are terrifically helpful when you need to find a nearby business or directions to the freeway. They're also terrifically helpful to advertisers, government agencies and even stalkers who can use them to track your every move.

The pros and cons of Windows 7 security

Posted: 28 Jun 2010 09:00 AM PDT


Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-party security products might be the better fit.

Misconfigured Cisco gear could lead to Wi-Fi breach

Posted: 28 Jun 2010 09:00 AM PDT


Users of a popular Cisco Systems wireless access point may be setting themselves up for trouble if they leave a WPA wireless migration feature enabled, according to researchers at Core Security Technologies.

State of the CSO 2010: Progress and peril

Posted: 28 Jun 2010 09:00 AM PDT


Security is very old in most respects, yet very young in others. As a corporate discipline, security unfortunately languished for years in the basement.

VMware co-founder tackles virtualization at Cisco

Posted: 28 Jun 2010 09:00 AM PDT


VMware co-founder Ed Bugnion, now at Cisco, is making sure the network adapts to the age of virtualization.

0 comments:

Post a Comment