Monday, February 13, 2012

Goodbye e-books, hello apps

Europe cares about privacy, so you must too | Now the EFF sounds an alarm about dating sites

Network World Voices of Networking

Forward this to a Friend >>>


Goodbye e-books, hello apps
E-book sales are, surprisingly, flattening and Gibbs knows why: E-books don't really work very well. Read More


WEBCAST: HP

Cloud and the IT Infrastructure
Join guest speaker, Rohit Mehra, IDC Director of Enterprise Communications Infrastructure, to explore current trends, discuss best practices for optimizing Data Center and identify ways to better allocate network resources, reduce operating costs and improve application performance. View Now!

WHITE PAPER: Shoretel

5 Important Use Cases for UC
Many organizations begin by focusing on using UC to enhance user productivity, but they soon find that both productivity and business processes can be improved by UC. Read now!

Europe cares about privacy, so you must too
In late January, the European Commission published a proposal "on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Read More

Now the EFF sounds an alarm about dating sites
Online dating sites seem to be taking an inordinate amount of abuse this Valentine's Day season. Not that I'm suggesting it isn't deserved. (Valentine's Day Google Doodle's through the years.) Read More


WHITE PAPER: Silver Peak Systems, Inc.

Silver Peak's Advantages in a Disaster Recovery Environment
Why do industry analysts agree Silver Peak is the WAN Optimization vendor of choice for offsite data replication? It starts with a unique, next generation architecture. Read more.

The real reasons why SOPA and PIPA are real bad
A reader letter makes Gibbs sum up why SOPA and PIPA are such bad ideas. Read More

Ruh Roh, Now The Bad Guys Are Using Open Source Too
What is good for the goose, is good for the gander, right? Open source has been so successful in giving us software like Linux, Apache, Hadoop, etc., why wouldn't the open source method work with other types of software? Probably no one expected that the criminals behind vast malware trojans would adopt open source methods to make their malware more dangerous, but they have. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Optimizing Offsite Disaster Recovery with Virtual WAN Op
Learn why one of the world's largest media companies chose Silver Peak virtual WAN Optimization for their cross country replication challenges including an on-demand media database requiring 7 x24 access. Complicating the challenge was a lack of space in the state-of-the-art data center for additional physical hardware. No problem. Learn more.

More Google Wallet follies
Well, well, well! It looks as though Google Wallet users who don't root their Android phones have something to worry about after all! And when you read about the details of this particular flaw, you will slap your head because it's a major bone-headed error on Google's part. Go read The Smartphone Champ for the scoop: Read More

iPad 3 on track for early-mid March release
It's that time of year again, folks. With March fast approaching, the iPad 3 rumors continue to roll in with increased frequency. And while some iPad 3 features remain open to speculation, we now have an idea as to when we might expect Apple to launch its next-gen tablet. Read More

No, Wikipedia has not forgiven GoDaddy for backing SOPA
It's been six weeks since Wikipedia founder Jimmy Wales took to Twitter to announce that his organization would be removing its domain name registrations from GoDaddy over what was then the latter's public support for SOPA. Read More



SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. No, Wikipedia has not forgiven GoDaddy for backing SOPA
  2. FBI unbolts Steve Jobs 1991 investigation file
  3. Cisco still dragging feet on OpenFlow
  4. Amazon attacks Apple: You get 3 Kindle products for price of iPad 2
  5. iPhone 5 release set for summer 2012 -- report
  6. Microsoft to issue 9 patches, 4 critical
  7. Four crazy tech ideas from Google's Solve for X project
  8. iPad 3 on track for early-mid March release
  9. Mobile World Congress sneak peek
  10. Buyers lining up for Raspberry Pi's PC

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: