Tuesday, January 31, 2012

13 Windows 8 features worth knowing about

  The Internet: It ain't designed to protect your privacy | All hail: Inside the museum of nonsense
 
  Network World Daily News PM

Forward this to a Friend >>>


13 Windows 8 features worth knowing about
Upgrades, system migration, support headaches -- IT folks are probably dreading the next major Windows rollout. Yet Windows 8, which is scheduled to move to the beta stage in late February and will likely launch in the fall, does offer several compelling new features for both IT and end users. Read More


WHITE PAPER: Google Apps

Google: Security for Google Apps Messaging & Collaboration
This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security. Read now.

WHITE PAPER: VMware & NetApp

Running Microsoft Enterprise Applications
This document provides guidance on how to design and architect a scalable Microsoft applications mixed workload solution using highly available VMware virtual infrastructure and NetApp unified storage. Read Now!

The Internet: It ain't designed to protect your privacy
Why do web companies keeping pushing users' limits on privacy protections? Basic economics, my dear Watson Read More

All hail: Inside the museum of nonsense
Austrian museum opens world to some crazy, humorous inventions Read More

Microsoft fine-tunes Windows 8 Beta with input from users
Microsoft continues to tinker with Windows 8 even as it finalizes its beta version, acting on suggestions it received from users who have experimented with the Windows 8 Developer Preview. Read More


WEBCAST: IBM

Customer Lifetime Value for IT
With technology underpinning much of the customer experience, IT and marketing must adopt new technologies to innovate and grow revenues. Watch the video to learn how IBM SPSS Predictive Analytics enables marketers while reducing the burden on IT. View Now

Has high-tech helped or hurt crime fighting? DoJ wants to know
The US Department of Justice is offering a $1 million grant to study the impact advanced technologies such as mobile communications, sensor networks and Web-based applications have had on the law enforcement community and crime. Read More

German appeals court says 'Nein' to Samsung's Galaxy Tab
A German appeals court today upheld an injunction against Samsung's Galaxy Tab tablet today, ruling that the device infringes upon Apple's intellectual property. Read More

More Android users take phones into bathroom than do iPhone, BlackBerry users
A new survey of 1,000 Americans confirms what you always suspected: A good many of those incoming Android, iPhone and BlackBerry calls and texts are originating from bathrooms. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

Just one more: 'S**t programmers say'
Yes, this "S**t (fill in the blank) say" meme is getting tiresome, but I actually laughed at the end of this video, so I can't resist sharing. (Warning: NSFW language.) My apologies if you didn't find it funny. Read More

Asus Padfone smartphone-tablet headed for Mobile World Congress
Asustek Computer has begun teasing yet another debut of its Padfone smartphone-tablet combo at the Mobile World Congress scheduled for Barcelona in late February, and industry watchers expect the device to run Android 4.0 (i.e. Ice Cream Sandwich). Read More

Zultys adds Android client for its IP PBX
Zultys has upgraded the software in its MX family of IP PBXs and added a Mobile Communicator client for Android-based smartphones, the company said on Tuesday. Read More

SeaMicro puts 256 Xeon cores in server
SeaMicro on Tuesday announced a new microserver that incorporates 256 Xeon processor cores to enable faster delivery of data for Internet-based activities such as social media or search. Read More

Resume Makeover: How an Information Security Professional Can Target CSO Jobs
In CIO.com's latest resume makeover, executive resume writer Donald Burns helps an information security professional (who is also a U.S. Army lieutenant) position his resume for management-level infosec jobs. Read More

 
 
 

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. IPhone 5 production set to begin
  2. 20 most anticipated tech products of 2012
  3. Stealing smartphone crypto keys using plain old radio
  4. SOPA, PIPA Anonymous: Can I have a little hope?
  5. Google, Microsoft, Facebook, Bank of America team to wipe out phishing
  6. Court affirms felony conviction of Palin e-mail snoop
  7. New leaders emerging in WAN optimization market
  8. AT&T appoints chief strategy officer
  9. Kindle Fire king of Android tablets
  10. IPad 3 rumor rollup for the week of Jan. 26
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Microsoft sets Office 15 public beta for summer 2012

Dying Jobs kept letter from Gates at his bedside | DMARC anti-phishing effort raises question about typo scammers

Network World Microsoft

Forward this to a Friend >>>


Microsoft sets Office 15 public beta for summer 2012
Microsoft announced it has kicked off a "technical preview" of the next version of its money-making Office suite and promised a public beta will ship this summer. Read More


WEBCAST: HP, Microsoft & Intel

Appliance video
The first appliance in the industry which consolidates and manages thousands of databases, integrates hardware, software and support and is scalable to meet your changing business needs. Learn more

WHITE PAPER: VMware & NetApp

Building Savings with Storage Efficiency
Read this success story to find out how ISG Technology, Inc., NetApp and VMware provided DCI with streamlined data protection, even higher levels of business continuity and the elasticity to support innovation and new ITaaS business opportunities. Learn More!

Dying Jobs kept letter from Gates at his bedside
Shortly before Steve Jobs died in October, he received a letter from longtime business adversary Bill Gates that moved him so much that he kept it by his bedside, according to the Apple founder's widow, as relayed by Gates to a British interviewer. Read More

DMARC anti-phishing effort raises question about typo scammers
There's essentially nothing but goodness in this latest anti-phishing effort -- called DMARC -- by the likes of Google, Microsoft, Yahoo, Paypal and Bank of America. The idea is to increase public confidence in email received from household-name domains and others by preventing spoofed email from reaching customers at all. Read More

Accused Kelihos botmaster proclaims innocence
Andrey Sabelnikov, the Russian programmer accused by Microsoft of creating and operating the Kelihos spam botnet said he's innocent. Read More


WHITE PAPER: Riverbed

Case Study – Constangy
Learn how to consolidate and virtualize many different servers, and eliminate the expense and difficulty of remotely managing the hardware and software. Read now!

Microsoft Kinect motion-sensing technology coming to laptops, sources say
Microsoft is working on implanting its Kinect technology into laptops, so you may soon be able to control programs with the wave of your hand. Read More

Microsoft Windows Phone 7 app fights malaria
Microsoft has awarded an Imagine Cup Grant to a team that developed a custom Windows Phone 7 and application that can diagnose malaria then upload the data to cloud servers that map the data to help track outbreaks. Read More

Microsoft Imagine Cup grants awarded to four teams from around the globe
When discussing Microsoft, we tend to focus on new product developments, financials, or forward-looking company strategies, but an entity with the size and influence of Microsoft tends to have a much farther reach than just consumable goods. Microsoft's Imagine Cup is a perfect example. Read More


WHITE PAPER: Citrix Systems

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn More

Apple breaks Microsoft's 'lock' on enterprise workers, argues analyst
The iPhone may have opened the door for Apple in the enterprise, but it was the one-two punch of the iPad and revamped MacBook Air in 2010 that really did the trick, an analyst said today. Read More

Microsoft partner: Office 365 app dev model to change, expand
External developers will be able to build much more sophisticated applications and tools for Office 365 once Microsoft releases the next upgrade of that cloud-hosted communication and collaboration suite, according to a Microsoft partner. Read More

Google, Microsoft, Facebook, Bank of America team to wipe out phishing
Can industry heavyweights Google, PayPal, Microsoft and AOL -- along with 11 others in high-tech such as Facebook and LinkedIn, as well as the financial world's Bank of America and Fidelity Investments -- succeed in stopping phishing attacks right in their tracks? In uniting behind an effort called DMARC.org unveiled today, the group says it can through policy-based steps filter out spoofed email that attackers use for phishing. Read More

Drive-by-download attack exploits critical vulnerability in Windows Media Player
Security researchers from antivirus vendor Trend Micro have come across a Web-based attack that exploits a known vulnerability in Windows Media Player. Read More



SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Stealing smartphone crypto keys using plain old radio
  2. First 'Super Wi-Fi' network goes live in North Carolina
  3. DARPA takes aim at "Achilles' heel" of advanced computing: Power
  4. Google, Microsoft, Facebook, Bank of America team to wipe out phishing
  5. Tips and tricks for upgrading your Android phone
  6. IPad 3 rumor rollup for the week of Jan. 26
  7. Juniper's financial challenges continue
  8. F5 says Big-IP is a network firewall
  9. New leaders emerging in WAN optimization market
  10. 802.11ac boosts buzz more than bandwidth

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


About Computer Networking: A Wireless Router for Brains

If you can't see this email, click here

About.com

Computer Networking

Fundamentals

Get Connected

Use and Upgrades



From Bradley Mitchell, your Guide to Computer Networking
It isn't for human brains (at least not yet), and it isn't exactly a router in the networking sense, but the Kendall Research wireless router for brains is a cool project with an interesting future ahead.

Introduction to Wi-Fi Wireless Antennas
Radio antennas are key components of Wi-Fi network communication systems, picking up incoming signals or radiating outgoing signals. Some Wi-Fi antennas, particularly on routers, are mounted externally and can be replaced with aftermarket ones that can increase a network's signal range.

Top VNC Free Software Downloads
Virtual Network Computing (VNC) technology enables sharing a copy of one computer's screen display with another computer over a network connection. Also known as remote desktop sharing, VNC can be used when wanting a monitor or control a computer from a remote location.
See More About:  vnc  remote computer access 

Signal Strength of Wi-Fi Networks
The performance of a Wi-Fi wireless network connection depends in part on signal strength. Between a computer and access point, the Wi-Fi signal strength in each direction determines the total amount of network bandwidth available. Several different methods for determining the wireless signal strength are available.

Internet Remote Access Software
Remote access software allows you to access personal data or assist family members with network problems when not physically at home. Good remote access software programs possess the right combination of features, performance and security.
See More About:  remote computer access  vnc 

 


Wireless / Networking Ads
Featured Articles
Is Using Wireless On Planes Dangerous?
Radio Frequency (RF) Interference With Wireless Devices
CAT5 and CAT5e Ethernet Cables
Wireless/Networking Message Board
Introduction to Virtual Private Networks
Home Network Diagrams

 

More from About.com

Top 10 Skin Myths
How do you know the information and advice you get about your skin is true? Start with this article, which debunks some of the the most persistent myths out there. More>



Living with Infertility
Infertility is extremely difficult emotionally, and it's easy to start feeling overwhelmed. Here are 10 ways to cope and keep infertility from taking over your life. More>




This newsletter is written by:
Bradley Mitchell
Computer Networking Guide
Email Me | My Blog | My Forum
 
Sign up for more free newsletters on your favorite topics
You are receiving this newsletter because you subscribed to the About Computer Networking newsletter. If you wish to change your email address or unsubscribe, please click here.

About respects your privacy: Our Privacy Policy

Contact Information:
249 West 17th Street
New York, NY, 10011

© 2012 About.com
 


Must Reads
Wireless Router Networking
IP Addresses + Internet Networks
Connecting Two Computers
Home Network Diagrams
Home Network Setup Advisor Tool
 
Follow me on:
Facebook Twitter

Advertisement

InterMedia, le Mag

Logo InterMédia
 
Vient de paraître.
     

Couverture Mag

 

Spécial Montagne n°1147


Dossier : événementiel en station : un terrain de jeu mal exploité par les marques

Enquête : quand la montagne gagne les annonceurs des plaines

Grand Témoin : Jean-Marc Silva
« Les marques suivent les évolutions de l'image de la montagne ».

40 pages quadri pour tout savoir sur les relations entre les marques et la montagne


Voir le sommaire détaillé dans notre boutique

Consulter les autres magazines thématiques

Pour ne plus recevoir de courriels de notre part, il vous suffit de vous rendre sur cette page.