Friday, March 02, 2012

15 high- tech wristwatches that would make Dick Tracy jealous

  TECH DEBATE -- The future of end user computing: Two visions | Steal Internet service? Go to jail
 
  Network World Daily News PM

Forward this to a Friend >>>


15 high- tech wristwatches that would make Dick Tracy jealous
Many have tried to create a wristwatch device that would bring Dick Tracy's famous device to life. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry Mobile Fusion
Now all personal and corporate-owned BlackBerry® smartphone and BlackBerry® PlayBook™ devices can seamlessly access business data and applications on a single, secure management platform. Soon, Apple® iOS and Google® Android™ devices will be able to do the same. Learn how this new approach will end mobile chaos at blackberry.com/mobilefusion

RESOURCE COMPLIMENTS OF: Ciena

Don't Miss: THE BANDWIDTH ULTIMATUM
Be the FIRST to hear about Ciena's BLOCKBUSTER, game-changing optical innovation of the decade. THINK BIGGER, SMARTER NETWORKS. Ones that are programmable, flexible, and scalable – and change the way you compete. Unrated. Uncut. Unbelievable. GO NOW.

TECH DEBATE -- The future of end user computing: Two visions
Personal computing as we know it is changing as hordes of workers arrive with their favorite new tech tools and demand access to corporate resources. We ask two companies likely to play key roles in the flexible new world of end user computing – VMware and Citrix -- to spell out the future as they see it. Who do you think is better positioned to deliver on the promise? Cast your vote. Read More

Steal Internet service? Go to jail
The Department of Justice said today a federal jury convicted a man on seven counts of wire fraud for offering a device that let his customers steal Internet services. Through is company known as TCNiSO, the DoJ said Ryan Harris developed and distributed hardware and software tools that let his customers modify their cable modems so that they could disguise themselves as paying subscribers and obtain... Read More

Notable quotes from RSA 2012
With thousands of security experts, vendors and customers turning out for the weeklong RSA Conference in San Francisco once again, how could there not be a few notable quotes? Here are my picks. Read More

Why Windows 8 ought to be DOA in business networks (at least initially)
Businesses need not rush out to upgrade to Windows 8 when it is released because deployed on desktops without touchscreen capabilities it offers few advantages over Windows 7. The Metro user interface in Windows 8 Consumer Preview is navigable with mouse and keyboard, but poses a learning curve that end users will find annoying and disruptive without giving real advantages. Read More


WHITE PAPER: APC

Quick Fixes for Messy Racks and Cable Sprawl
Data center professionals can rid themselves of messy racks, sub-standard under floor air distribution, and cable sprawl with a minimum of heartache and expense. This paper outlines several innovative approaches for dealing with the symptoms of chaos and for eliminating the root causes of disorder. Learn More

Cisco, others see record carrier equipment sales in 2011
The carrier router and switch market hit a record-high $14.5 billion in 2011, up 8% over 2010, according to Infonetics Research. Yet the 2011 results also indicate that the overall market may be slowing. Read More

Vendors pile on mobility management
Managing and securing the world of mobile computing is an evolving art, as a quartet of vendors showed at Mobile World Congress, each taking different approaches to the challenge. Read More

Will the ASUS PadFone challenge Apple?
At Mobile World Congress this week, ASUS showed off more of its PadFone combination smartphone/tablet, as well as the new Transformer Pad Series. The PadFone features a 4.3-inch smartphone (with Super AMOLED qHD display), a Qualcomm Snapdragon S4 1.5GHz dual-core processor, 8 megapixel digital camera, and the Android 4.0 operating system (Ice Cream Sandwich). When the PadFone was first announced last... Read More

Should US intelligence agency have a role in protecting electric grid?
As Congress wrestles over cybersecurity legislation related to securing critical infrastructure and the electric power grid, arguments are surfacing on whether the power companies should handle any new federally mandated network protections or whether the U.S. government -- in particular the National Security Agency -- should be in the middle of it. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Apple speeding toward 25 billion app downloads
Apple's running total of the number of app downloads made via its App Store is quickly approaching 25 billion -- which means that the winner of a $10,000 iTunes gift card for the landmark downloader should be chosen sometime today or tomorrow. Read More

FBI: Cyberattacks could shove aside terrorism as No. 1 threat to US
The leaders of the Department of Defense and the Federal Bureau of Investigation this week separately expressed concern over the increasing numbers of cyberattacks, with FBI Director Robert Mueller saying that while terrorism remains the FBI's top priority, "in the not too distant future, we anticipate that the cyberthreat will pose the No. 1 threat to our country." Read More

You are the product for The Google
As of March 1, if you hadn't erased your Google Web History and switched the feature off, you will have made a big mistake because Google has set itself on a course that will allow the company to find out way too much about you ... at least, way too much about you if you have any interest in maintaining your privacy. Read More

12 Ways to Make Your Online Profile Work for You
Like it or not, your digital identity is what defines you to potential employers and recruiters seeking you out online. And if you're interested in pushing your career forward, experts suggest that you take your digital identity seriously. The right words, photos, and social media banter online can impress a prospective employer or recruiter, while the wrong ones may turn them off. Read More

Supersize me: Hadoop upgrade will handle even bigger data
Apache aims to have the upcoming 0.23 release this year be able to run on 6,000-node clusters Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Destroy digital evidence before it destroys you
  2. Top 25 iPhone & iPad apps for business
  3. How to catch an Internet cyber thief
  4. Hands-on with Windows Server 8 beta
  5. Windows 8 review: 'Mission accomplished', 'transcendent', 'unintuitive'
  6. How to protect your online privacy
  7. Windows 8: What you need to get started
  8. AT&T ups "unlimited" 3G throttling cap to 3GB
  9. Juniper targeting 7 key market segments
  10. Mozilla's 'modest proposal': Dump the smartphone OS
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment