30 Days With Google+: Day 4
Google+ is built around the concept of Circles. Building a social network on Google+ seems like a more conscious or intentional exercise because I can’t add someone to the social network without placing the contact into at least one Circle. Some privacy advocates see this as a benefit, but I can also see a potential downside to the way the Circles are used.
The Pros
…
Categories: General.
Tags: Circles, Cons, Google, Pros
By IPHere —
August 7, 2011 at 7:19 pm 30 Days With Google+: Day 5
Google ruffled feathers when it simply shut down thousands of Google+ accounts citing a policy that you must use your real name for your Google+ profile. Google since backed off a little on how aggressive it is with enforcement, but the policy itself sparked an online debate about the virtues of pseudonyms and the value of using your real name.
Categories: General.
Tags: 'Real, Debate, Google, Names
By IPHere —
August 7, 2011 at 1:13 pm Security is often at odds with user-friendliness. That challenge could rise to new heights with the expanding stream of users handling enterprise documents on their tablets and smartphones. WatchDox, already in the business of document security, just released the latest version of its namesake product that promises to reconcile the challenges of securely handling documents with the latest trends of mobile device usage.
Network Computing
Permanent link to this post (66 words, estimated 16 secs reading time)
Categories: General.
Tags: BlackBerrys, Document, Expands, iPads, iPhones, Portable, Security, WatchDox
By IPHere —
August 6, 2011 at 7:14 pm Qualys has announced a new user interface to streamline management of its QualysGuard suite of vulnerability management and compliance SaaS offerings. Qualys also announced general availability of version 2 of its Web Application Scanning Service (WAS) and a new release of its Consultant Edition.
Network Computing
Permanent link to this post (47 words, estimated 11 secs reading time)
Categories: General.
Tags: Announces, Application, Qualys, Scanning, Service, Services, Upgrades
By IPHere —
August 6, 2011 at 1:13 pm Core Security has introduced mobile device testing and measurement in the latest version of its Core IMPACT penetration testing software. Version 12 also improves Core’ integration with the popular open source Metasploit Framework pen-testing tool.
Network Computing
Permanent link to this post (38 words, estimated 9 secs reading time)
Categories: General.
Tags: Adds, Core, Device, Exploits, Impact, Integration, Metasploit, Mobile, Widens
By IPHere —
August 6, 2011 at 7:13 am Radiant Logic solves many of the problems associated with federated security across cloud offerings and applications with its latest combination of Virtual Directory Server Plus and RadiantOne Cloud Federation Services.
Network Computing
Permanent link to this post (33 words, estimated 8 secs reading time)
Categories: General.
Tags: Announces, Cloud, Federation, Logic, Radiant, Service
By IPHere —
August 6, 2011 at 1:19 am In the conflict currently raging between HP and Cisco, both vendors are claiming victory in the enterprise switch market. As the growing propaganda broadsides include market research that can support both camps, and disputed product comparisons that feature new and not-yet-shipping products, Network Computing will try and bring a little clarity to the situation.
Network Computing
Permanent link to this post (57 words, estimated 14 secs reading time)
Categories: General.
Tags: first, switches, Who's
By IPHere —
August 5, 2011 at 7:19 pm Apposite Technologies is introducing a new emulator appliance to test how applications work on enterprise WANs. The Apposite Netropy 10G2 WAN Emulator is designed to test applications that will run on new 10 Gbps networks. An Apposite executive says the migration from 1Gbps to 10Gbps networks, suspended during the recession, is now picking up speed.
Network Computing
Permanent link to this post (58 words, estimated 14 secs reading time)
Categories: General.
Tags: 10Gbps, Emulator, Enterprises, Measures, Migrate, Networks, Performance
By IPHere —
August 5, 2011 at 1:15 pm A great end goal for the cloud model is PaaS. PaaS breaks the 1:1 relationship between OS and application/service and provides for more fluid scalability. Additionally, PaaS platforms can remove the requirement for custom OS and server builds on a per service basis, further reducing administrative
overhead.
Network Computing
Permanent link to this post (50 words, estimated 12 secs reading time)
Categories: General.
Tags: Building, PaaS, Private
By IPHere —
August 5, 2011 at 7:13 am More than 70 government agencies, large commercial enterprises and other organizations have been victims of a series of long-term targeted attacks resulting in the loss of sensitive information and intellectual property over the last five years, according to an investigation by McAfee. In a probe dubbed Operation Shady RAT, researchers gained access to one of the attackers’ servers and obtained detailed insight into the victims, the information stolen, and the methods used.
Network Computing
Permanent link to this post (75 words, estimated 18 secs reading time)
Categories: General.
Tags: 'Operation, Attacks, Enterprises, Five, Government, LongTerm, Perpetrated, Rat', Shady, Years
By IPHere —
August 5, 2011 at 1:12 am