Thursday, January 19, 2012

Can employee-owned devices save companies money?

10 must-have Google Chrome add-ons | Apple Mac-based security threats jumped in 2011

Network World Daily News PM

Forward this to a Friend >>>


Can employee-owned devices save companies money?
The "bring your own device" (BYOD) phenomenon is sweeping through the enterprise, and businesses such as Chicago-based design firm Holly Hunt have embraced it with gusto, offering stipends to employees to use their own mobile devices for work. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers - from dynamic firewalls to intrusion detection, and account management. Halo is SaaS and installs in 5 minutes. Halo Basic is free for up to 25 servers. Try Halo

WEBCAST: VMware & NetApp

Path to Cloud: Virtualizing Business Critical Applications
NetApp and VMware experts discuss how customers can virtualize business-critical applications leveraging common resource pools as key elements to delivering IT as a service. Learn More!

10 must-have Google Chrome add-ons
From a session saver to a social media assistant to a simple in-browser image editor, these extensions provide a variety of useful tools for the growing legions of Chrome users. Read More

Apple Mac-based security threats jumped in 2011
New Mac-based security threats jumped in 2011, but still remain far below that of Windows PCs, according to a posting by F-Secure Labs. Read More

Apple tries to redefine textbooks with iBooks 2
Apple on Thursday bought traditional textbooks to the digital age with the new iBooks 2, a tablet application that will bring in support for multimedia textbooks for a more interactive and engaging learning experience. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WAN optimization market shakeup predicted
WAN optimization is shaping up to be one of the hottest areas of the network equipment market, prompting industry experts to predict high-profile acquisitions and vendor shakeups in the near future. Read More

U.S. losing high-tech jobs, R&D dominance to Asia
U.S. companies are locating more of their research and development operations overseas, and Asian countries are rapidly increasing investments in their own science and technology economies, the National Science Board (NSB) reported this week. Read More

New AT&T smartphone and tablet plans pricier but offer more data
AT&T has announced new smartphone and tablet data plans that start at higher prices than current plans but also offer more data for the buck. However, if customers are satisfied with what they've got, they can stick with it. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

RSA says 2012 will focus on mobile, cloud security
Beyond addressing details about its big breach of 2011, RSA Security executives this week outlined its 2012 product strategy that is centered on three areas, mobility, anti-threat and cloud security. Read More

Security history: Nothing like an old-fashioned boot sector virus
It has been 26 years to the day when the computing world was introduced to its first virus: The Brain. Read More

This was bound to happen on anti-SOPA 'blackout day'
Even though it has been the center of my blogging attention since awakening this morning, the whole anti-SOPA "blackout day" thing was bound to trip me up sooner or later ... and it did. A question popped into my mind, namely: What was the name of the family dog on "The Jetsons"? (Don't ask why I wanted to know, because the reason is even less important than the question.) Read More

CIO Challenge: Mobile App Vendors Bypass IT
At the AppNation Enterprise Summit, mobile upstarts learn to do an end-run around straight-laced CIOs. This will surely test the often rocky IT-business relationship, but could ultimately improve it. Read More



SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Google at work and play
  2. 12 available devices to test drive Windows 8
  3. The 36 best iPhone games
  4. What do your gadgets really weigh?
  5. The best of CES 2012
  6. Will 2012 be the dawn of DNSSEC?
  7. RSA, unapologetic, looks to move beyond The Breach
  8. Fundamental Oracle flaw revealed
  9. 5 reasons Macs are gaining ground in the enterprise
  10. New Facebook attack targets e-cash users

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment