CenterBeam News Log
News You Can Use




Subscribe to "CenterBeam News Log" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
 

 

Wednesday, September 11, 2002
 

Outsourcing

Giga, 9/10/02:  Deciding to Outsource or Do-It-Yourself in Security Monitoring/Intrusion Detection

Michael Rasmussen

With increased focus on security, along with standards/regulations enforcing adoption, the demand for a process to monitor for security events across the enterprise has grown. To answer this need, security product vendors and managed service providers have responded with a wide range of solutions that may or may not meet your requirements.  The question is — do I develop this process in-house, or do I outsource it? The answer lies in understanding how critical security monitoring is to your organization.

[more]

Microsoft

ZDNet, 9/10/02:  MS buys security software specialist

By Sandeep Junnarkar

Microsoft on Tuesday announced it is acquiring XDegrees, a maker of security software, in a move to further the software giant's goal of improving Windows security.

XDegrees, a small company based in Mountain View, Calif., makes products to secure information access across computer systems installed in large companies. The company plans to relocate to Redmond, Wash. Financial terms and the number of employees involved in the deal were not disclosed.

[more]

ZDNet, 9/6/02:  Why Windows makes mobility so hard

By Larry Seltzer

Have you ever tried to move a Windows notebook between two networks?

Consider a Windows domain at work and a home network using a workgroup, or perhaps two branch offices that aren't in the same domain. When you boot up a notebook in one after being in the other, there are numerous settings you have to change in order get the notebook to join the network properly--and you have to do this every time you switch.

[more]

The Register, 9/10/02:  IE 6 SP1 omits fixes for 20 outstanding flaws

By John Leyden

Researchers have discovered that inadequate security restrictions in Internet Explorer make it possible for an attacker to execute script on any Web page that containing frames.

[more]

Intel

Giga, 9/9/02:  LANDesk Spin-off Is Good for Customers

The primary strength of this separation will be the ability of the new company to focus all of its resources on the LANDesk suite of products. The new team, expected to be in the neighborhood of 150 strong, will no longer be operating within the confines of Intel’s operating parameters but rather as an independent entity able to focus the appropriate resources necessary to move the LANDesk product forward. It likely comes as no surprise to existing LANDesk customers that the product has languished at Intel during the last two years, offering little in the way of significant upgrades and improving its position with respect to mobile systems only through the partnership with XcelleNet.

[more]

IDG News, 9/10/02:  Update IDF: Intel lays out vision of mobile lifestyle

Tom Krazit, IDG News ServiceBoston Bureau

SAN JOSE, CALIFORNIA - Users increasingly want their home, office, mobile and consumer-electronic devices to exchange multimedia content, according to Intel Corp. executives who spoke Tuesday morning at the Intel Developer Forum here. This demand is in turn driving the design of the next generation of computers, especially mobile machines such as notebook PCs and wireless handheld devices, they said.

[more]

The Wall Street Journal, 9/11/02:  Intel, Verisign Team to Create ID Cards for Laptop Security

SAN JOSE, Calif. -- Intel Corp. and VeriSign Inc. said they will create digital identity cards that personal-computer makers can install on notebook computers that use Intel's forthcoming Banias processor, to help improve security for mobile-computer users.

[more]

Wiresless

ZDNet, 9/11/02:  Is Wi-Fi ready to roam?

 By Ben Charny

Networking groups around the globe are working on ways for Web surfers to roam on any number of wireless networks--just as mobile phone users roam on cellular networks.

The popularity of Wi-Fi--which features networking nodes that use the 802.11b wireless technology to broadcast an Internet connection over a radius of 300 feet--has spawned a number of independent companies that offer wireless services. Yet it is difficult, and prohibitively expensive, for many customers of a Wi-Fi service to use the network of another.

[more]


7:15:52 AM    


Click here to visit the Radio UserLand website. © Copyright 2005 Brian D. Johnson.
Last update: 4/20/2005; 2:44:52 PM.
This theme is based on the SoundWaves (blue) Manila theme.
September 2002
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Aug   Oct