Thursday, March 21, 2013

Cisco inadvertently weakens password encryption in its IOS operating system

  Cisco inadvertently weakens password encryption in its IOS operating system | British government disputes reports that it rejected BlackBerry 10 for security reasons
 
  ITworld Enterprise Networking

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Google Fiber to expand service beyond Kansas City
Google is expanding its Google Fiber project in Kansas to Olathe, the fifth largest city in the state. Read More


RESOURCE COMPLIMENTS OF: NetApp

Don't Compromise.
Get affordable solutions that grow with your organization. Download the VMware® and NetApp® trial. Learn more www.netapp.com/dataontap

WHITE PAPER: Phoenix NAP

Eliminate Virtualization Management Challenges
This whitepaper will explore the hard realities of cloud computing and will seek to provide insight into what large and small enterprises should look to as they begin their quest for increased cost savings and reduced capital expenditures. Learn more.

Cisco inadvertently weakens password encryption in its IOS operating system
The password encryption algorithm used in some recent versions of the Cisco IOS operating system is weaker than the algorithm it was designed to replace, Cisco revealed earlier this week. Read More

British government disputes reports that it rejected BlackBerry 10 for security reasons
A British government security group said Wednesday said it hasn't yet evaluated the security of BlackBerry 10 devices such as the Z10. Read More

4 ways federal fiscal austerity will impact CIOs
First there was the fiscal cliff. Now there's the sequester. Neither caused the sky to fall, but both will have a slow, steady impact on the economy. That means CIOs should tread carefully when crafting IT budgets for the next couple years--and shouldn't be surprised to hear 'No.' Read More


WHITE PAPER: APC by Schneider Electric

Small Data Centers: Unique Challenges, Unique Opportunities
This whitepaper shares real-world trials and tribulations from data center managers in the trenches who deal with the unique challenges of running a data center in constrained space - as well as solutions. Vendor neutral. Learn More.

Why VPN logs don't measure worker performance
Yahoo is looking at it wrong. A decade or more into the work from home debate, companies still haven't figured out how to make it work. Read More

Head to head: Samsung Galaxy S 4 vs. HTC One
What's the Android coolest flagship of them all? Read More

Privacy protection for documents stored in the cloud gets DoJ nod
As House subcommittee weighs overhaul of 1986 statute to strengthen privacy in the cloud, senators introduce their own legislation to update Electronic Communications Privacy Act. Department of Justice affirms the Obama administration's support for an overhaul. Read More

 

BOOK GIVEAWAY

Enter now for your chance to win! We've got 5 copies of each book to give to some lucky winners.

jQuery, jQuery UI, and jQuery Mobile: Recipes and Examples
This guide brings together more than one hundred self-contained, downloadable examples, each with an in-depth explanation of how the code works and how to adapt it for your own needs.

The Book of GIMP: A Complete Guide to Nearly Everything
Whether you're just getting started with this free Photoshop alternative or working to master GIMP's more complex features, you'll find the answers you're looking for in The Book of GIMP.

DON'T MISS...

20 historic tech sounds you may have forgotten

How to get your personal data removed from people search websites

25 crazy and scary things the TSA has found on travelers

10 geeky street signs: Finding your way to nerdvana

The best office apps for your iPad

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_networking as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.