Monday, December 12, 2011

School swaps out Mac servers for Windows ones

  20 Most Anticipated Tech Products of 2012 | AT&T, DOJ file motion to halt antitrust proceedings
 
  Network World Daily News PM

Forward this to a Friend >>>


School swaps out Mac servers for Windows ones
For a self-described "Mac person" working as a technology manager in a college preparatory school that had been a "Mac school" for as long as he could remember, it was a hard thing to have to face but he said it out loud: "Apple never took enterprise computing seriously," says a somewhat disillusioned Adam Gerson, co-director of technology at Columbia Grammar and Preparatory School in New York City. Read More


WHITE PAPER: Cisco Systems

Get Ahead of the Post PC Era
New devices, mobility, video, the cloud - learn how these powerful market forces are transforming business and the IT industry today. Learn More

RESOURCE COMPLIMENTS OF: EMC

Do you need faster backup and recovery?
According to an IDC study, more people need faster backup, reliable recovery, and seamless integration. Read about market share positions for eight named purpose-built backup appliance vendors, including EMC. Learn why more people chose EMC for their backup and recovery needs and why EMC is emerging as today's revenue share leader in this market. Click to continue

20 Most Anticipated Tech Products of 2012
From Apple's iPhone 5 to next-gen thermostats to OLED TVs, here are 20 tech products we're looking forward to seeing in 2012. Read More

AT&T, DOJ file motion to halt antitrust proceedings
The U.S. Department of Justice and AT&T Monday filed a joint motion to halt proceedings in the U.S. agency's lawsuit to block the telecom giant's US$39 billion acquisition of mobile competitor T-Mobile USA. Read More

Testing shows IPv6 is becoming deployable in customer edge routers
The University of New Hampshire InterOperability Laboratory (UNH-IOL) hosted its third IPv6 Customer Edge (CE) Router Interoperability Test Event the week of November 7-11, 2011. The event brought together users and suppliers of CE Router equipment in order to gain perspective on the current status of interoperability against the Internet Engineering Task Force's (IETF) Basic Requirements for IPv6 Customer Edge Routers. Read More


WHITE PAPER: FireEye

5 Methods to Disrupt Next- Gen Threats
Relying on signatures and lists are ineffective when trying to combat advanced malware threats. Discover how to augment existing firewalls, IPS and Web gateways with technology that recognizes new attacks in real-time without requiring prior knowledge of vulnerability, exploit or variant and then prevents system compromise and data theft. Read now.

Apple: Mac App Store hits 100 million app download milestone
Apple Monday trumpeted news that 100 million apps have been downloaded from its Mac App Store, which went live in early January. Read More

Quad-core smartphones with high-res screens will take over in 2012
Competition in the smartphone sector will remain cutthroat in 2012, as vendors will improve performance using LTE, high-resolution screens and quad-core processors and GPUs. Read More

Google Enterprise VP: Google Apps mega-deals in the pipeline
Google plans to announce in the coming month or so several customer wins for Google Apps that exceed 100,000 users, according to Google Enterprise Vice President Amit Singh. Read More


WHITE PAPER: Quest Software

Data Protection Solutions
The simpler a backup plan is to plan and execute, the more likely it is to be done. Read Now!

Some Thoughts on The SANS 20 Critical Security Controls
As I transitioned from the weekend to the work week last night, I settled down to review the 20 Critical Security Controls (v3) published by the SANS Institute. If you haven't seen this list, you really should take a look as it's an extremely focused, well written, metrics-based strategy for protecting your organization against the most likely security risks. The first two controls are: 1. Inventory... Read More

The security threat Stephen King warned us about?
Remember the film "Maximum Overdrive," where machines took over and went on a murderous rampage? With cars and appliances ever more computerized, such a security threat seems a little less farfetched as we head into 2012. Read More

Nokia Siemens sells fixed broadband to Adtran
Nokia Siemens Networks is selling its fixed-line broadband access business to Adtran, the latest in a series of sell-offs, the company said on Monday. Read More

How to Tame a Bad Boss: 8 Practical Techniques
Employees don't have to suffer under the tyranny of a bad boss. Management experts say employees possess the power to soften a bad boss's sharp edges. Here are eight tactics for making a bad boss more bearable. Read More

YEAR END: 2011 Future Tech & Prototype Review
If 2011 is any indication, our future relies on robots and computer intelligence. In this year's future technology and prototype review we'll take a look at technologies that could one day be common place making our lives easier and more enjoyable. Read More

 
 
 

SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 8 free Wi-Fi security tools
  2. Surveillance industry objects to spying secrets & mass monitoring leaks
  3. Microsoft: 5 smart, 5 dumb moves the company made in 2011
  4. Usenix: Google deploys IPv6 for internal networks
  5. The tech jobs hiring boom is real -- for these skills
  6. Security roundup
  7. What's really going on with Carrier IQ on your phone
  8. Private investment firm buys Blue Coat for $1.3 billion
  9. 10 most powerful cloud companies
  10. Cisco storms back in switching
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: