Wednesday, August 17, 2011

Has Google Shot Android In The Foot?

Open Source Support Reward Mechanisms | Couchbase Scores 14m In New Funding

Network World Linux and Open Source

Forward this to a Friend >>>


Has Google Shot Android In The Foot?
Alan Shimel: One of Android's key strengths is that its wide base of manufacturers allows it to be sold on just about every network, in many form factors and price points. Now makers like Samsung and HTC may ask themselves, how do we compete with Droid? Read More


WEBCAST: Riverbed

Analyze Multi-Terabyte Network Traffic Recordings
See Cascade Shark in action. This Webcast demonstrates how the only network analysis software fully integrated with Wireshark, the world's most popular network protocol analyzer, is capable of sustained, multi-gigabit per second recording of network traffic without packet drops. See how easy this powerful tool is to use. Learn more!

WEBCAST: Riverbed

High-Performance Network Traffic Recording
See Cascade Shark in action. This Webcast demonstrates how the only network analysis software fully integrated with Wireshark, the world's most popular network protocol analyzer, is capable of sustained, multi-gigabit per second recording of network traffic without packet drops. See how easy this powerful tool is to use. Learn more!

Open Source Support Reward Mechanisms
Stephen Spector: In the last few weeks I have participated in several meetings on the topic of adding a reward system to community forums. Read More

Couchbase Scores 14m In New Funding
Alan Shimel: Couchbase, the company formed through the merger of Membase and CouchOne (developers of the open source CouchDB), announced that they have raised $14M in venture capital. Read More


WHITE PAPER: GFI Software

Protecting Against the New Wave of Malware
Learn why traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats. Read now!

Fedora 16 to skip btrfs by default
Joe Brockmeier: One of the main features planned for Fedora 16 was a switch to btrfs by default. However, as the first alpha for F16 approaches, it looks like it will be another cycle before the filesystem gets its day in the sun. Read More

Google's VP8 Getting Help From An Unlikely Source
Alan Shimel: Google received support this week for its embattled WebM video format from an unlikely source. Skype announced that it has adopted VP8 the codec in WebM as its default. Read More


WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

How Linux mastered Wall Street
When it comes to the fast-moving business of trading stocks, bonds and derivatives, the world's financial exchanges are finding an ally in Linux. Read More

Study finds Android app-makers careless with some data
A lot of the software written for Google's Android mobile phones falls short when it comes to user privacy and security. Read More

CloudSwing enables open source cloud stacks
OpenLogic's service will go up against PaaS offerings from Red Hat and VMware. Read More

Four Steps Toward a Successful Open Source Project
Are you thinking about launching an open source project in your organization? Want to do it the right way? Then take this advice from the experts. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. Driver using two cell phones gets 12 month driving ban
  2. Cops use device to find child porn on wireless networks
  3. WiMAX is dead
  4. 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
  5. 10 scariest hacks from Black Hat and Defcon
  6. IT recruiting a casualty of the recession
  7. Internet Explorer is best at protecting against drive-by downloads
  8. Google lashes out at patent trolls with Motorola buy
  9. Steve Jobs chatting with Bill Gates in 1991
  10. Windows 7 vs. Windows 8

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: