Leading Virtual Teams to Real Results

.
0 comments

Leading Virtual Teams to Real Results


Leading Virtual Teams to Real Results

Posted: 30 Jun 2010 08:23 AM PDT


As Whitacre describes in his blog , "I made my own conductor track, filming it in complete silence, hearing the music only in my head. Bob Taccini, a 52-year-old vice president of finance at Cisco Systems, has faced this situation personally. One of the most effective tools Taccini has used is a monthly video blog (vlog).

Brought to you by: Informal Learning Flow

Heartland ramps up first end-to-end encryption

Posted: 30 Jun 2010 09:00 AM PDT


Heartland Payment Systems, the victim last year of a massive data breach of sensitive card data, vowed after that devastating event to develop new security gear based on end-to-end encryption between itself and its merchants to prevent such a breach from occurring again. That's now taking shape, but slowly.

Cisco's TRILL drill: FabricPath beats IETF standard to market

Posted: 30 Jun 2010 09:00 AM PDT


Cisco this week expanded its data center arsenal with software, switches, modules and services all designed to scale the infrastructure to meet the demanding needs of virtualization, application complexity and cloud computing.

Cisco tablet not an iPad knock-off: Chambers

Posted: 30 Jun 2010 09:00 AM PDT


Cisco's new Cius tablet for business collaboration will remain a workplace tool and not morph into a consumer-market competitor to the iPad or Kindle, company CEO John Chambers told a press roundtable at Cisco Live here this week.

Google steals security page from Mozilla's Firefox

Posted: 29 Jun 2010 09:00 AM PDT


Google plans to take a page from Mozilla's playbook and block outdated plug-ins from launching, part of new efforts to keep Chrome users safer.

Group to examine cloud standards

.
0 comments

Group to examine cloud standards


Group to examine cloud standards

Posted: 29 Jun 2010 09:00 AM PDT


Last week I had the opportunity to participate in the "Cloudchasers" series of podcasts hosted by noted raconteur Mathew T. Grant. This one included Ajay Sharma, the product marketing manager for identity management at Novell, and myself talking about "Identity and the enterprise cloud."

Freebie JonDo Protects Your Identity Online

Posted: 29 Jun 2010 09:00 AM PDT


JonDo (free) anonymizes your connections using a proxy service, so that a Web site or other Internet destination won't be able to see where you're really coming from. But while the software is free, and there's also a free level of service, it'll still cost you a good deal of connection speed.

HP consolidates, protects data centers

Posted: 29 Jun 2010 09:00 AM PDT


HP this week unveiled data center switching and security products designed to simplify server connectivity and protect data in a converged infrastructure.

Hackers vandalise 200 web sites, cripple 150

Posted: 29 Jun 2010 09:00 AM PDT


The web sites of more than a whopping 200 Australian organisations were hijacked and vandalised in a spate of hacks last week.

HP draws on Avaya as a unified communications partner vs. Cisco

Posted: 29 Jun 2010 09:00 AM PDT


HP has brought Avaya into its alliance partners program in a move that will help it compete against Cisco by offering more choices to customers interested in unified communications and contact centers.

Asian SMBs focused on protecting their information

Posted: 28 Jun 2010 09:00 AM PDT


Small and mid-sized businesses (SMBs with 10 to 499 employees) are now focused on making protecting their information their highest IT priority, according to Symantec.

Social networks leak your information, study says

Posted: 28 Jun 2010 09:00 AM PDT


A study finds that shows that mobile social networks are giving data about users' physical locations to tracking sites and other social networking services.

You Are Here: Scary New Location Privacy Risks

Posted: 28 Jun 2010 09:00 AM PDT


Location-based services on a mobile phone are terrifically helpful when you need to find a nearby business or directions to the freeway. They're also terrifically helpful to advertisers, government agencies and even stalkers who can use them to track your every move.

The pros and cons of Windows 7 security

Posted: 28 Jun 2010 09:00 AM PDT


Businesses are eyeing a transition to Microsoft Windows 7, and with a wealth of security features that are part of it, it's worth figuring out the good and bad about each of them, says Gartner analyst Neil MacDonald, who notes in some cases, third-party security products might be the better fit.

Misconfigured Cisco gear could lead to Wi-Fi breach

Posted: 28 Jun 2010 09:00 AM PDT


Users of a popular Cisco Systems wireless access point may be setting themselves up for trouble if they leave a WPA wireless migration feature enabled, according to researchers at Core Security Technologies.

State of the CSO 2010: Progress and peril

Posted: 28 Jun 2010 09:00 AM PDT


Security is very old in most respects, yet very young in others. As a corporate discipline, security unfortunately languished for years in the basement.

VMware co-founder tackles virtualization at Cisco

Posted: 28 Jun 2010 09:00 AM PDT


VMware co-founder Ed Bugnion, now at Cisco, is making sure the network adapts to the age of virtualization.