Thursday, June 16, 2011

Who needs a cloud? Microsoft sold 31 million copies of Office 2010

3 tips for migrating applications to Windows 7 | Microsoft issues first patch for IE9 amidst 34 holes closed

Network World Microsoft

Forward this to a Friend >>>


Who needs a cloud? Microsoft sold 31 million copies of Office 2010
Microsoft is lording it over its cloud computing competitors with big sales of Office 2010. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

3 tips for migrating applications to Windows 7
Windows 7 migrations are occurring throughout the business world, but not without expense and hassle. One of the most difficult questions is how to let applications designed for Windows XP and earlier versions of Windows make the trip into the next generation of Microsoft-based computing. Read More

Microsoft issues first patch for IE9 amidst 34 holes closed
As expected, this month's Patch Tuesday is a whopper. Microsoft released 16 security updates (nine critical and seven important) addressing 34 vulnerabilities, including the first patch for Internet Explorer 9 and a rare patch for Hyper-V. Read More

Windows XP, Vista AutoRun update reduces malware infections by 82%
Microsoft credited a February security update for lowering AutoRun-abusing malware infection rates on Windows XP and Vista by as much as 82% since the start of the year. Read More


WEBCAST: Oracle

Secure Your Data Where it Lives
WikiLeaks, Epsilon, TJX: Explosive headlines tell us that data leaks are common and dangerous. According to IDC, "Increasing Database security is one of the most efficient and cost effective measures an organization can take to prevent data leaks." Register Today!

Microsoft's Zen Lesson: Windows 8 Hardware Squeezes
Occasionally, Microsoft learns lessons deeply-- and more deeply than they'll let on. I think you'll see proof of this in Windows 8, as Microsoft starts to slim down its hardware compatibility list to enjoy some of the benefits caused by simplicity, cited as a benefit that Apple now enjoys. Simplicity is bliss, and Zen is all about simplicity (and a predictable consumer experience). Read More

Asus may put Win 8 in next Eee Pad Transformer tablet
Let the Windows 8 hardware rumors begin. According to Notebook Italia, Asus is eyeing Windows 8 for the next version of its Eee Pad Transformer, a tablet with an optional keyboard and trackpad dock that props the device up like a netbook. Read More

Microsoft patches critical IE9, Windows bugs
Microsoft patched 34 vulnerabilities in Windows, Internet Explorer, Office and other software, 15 of them labeled "critical" by the company. Read More


WHITE PAPER: CA Technologies

Exceptional Application Experience
To improve and ensure the performance and availability of business-critical web applications, organizations need to be able to see and understand the actual user experience. This paper examines the five essentials of application performance monitoring. Learn More

Windows 7 migration: Tips and tricks
Guide covers all the bases of migrating to Windows 7, from expert tips to vendor tools to make it easier. Read More

What happens if you catch a hacker and must deal with the FBI?
After writing an article about a Department of Justice report, stating the FBI focuses on catching kiddie porn perps and many agents lack the know-how to work on national security issues, I was contacted by a man who says he's worked with the FBI to catch hackers. You might be surprised at how hard it can be for an IT professional to work with the FBI on a hacker case. This is one IT professional's story. Read More

Study finds technology embracers are a shiny, happy lot
A new study from marketing firm Ogilvy & Mathers and online communities company Communispace finds U.S. families that embrace technology have a more optimistic outlook on life today and for their children's future. Read More

FBI dumpster diving brigade coming soon to snoop in a trashcan near you
You might think you are interesting, but are you a person of interest? Let's hope not, since the 2011 edition of the FBI's Domestic Investigations and Operations Guide invites agents to take up dumpster diving, rummaging full-throttle through your trash while snooping in your life. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. FBI dumpster diving brigade coming to a trash can near you
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. 10 iPhone passcodes to pass on
  4. EU ministers seek to ban creation of 'hacking tools'
  5. Want to stop cybercrime? Follow the money
  6. Ubuntu breaks from the Linux pack
  7. Cisco distracted by reorg
  8. Cisco backs embattled RSA SecurID
  9. Gartner: IT should be planning, moving to private clouds
  10. Cisco fabric launch seeks to undermine Arista, IBM

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment