Thursday, May 17, 2012

History's first prank phone call was way back in ... 1884?

Cisco mobility bundles target BYOD, mobile virtual desktop | Whose high-tech exec job hinges on the presidential election?

Network World Daily News AM

Forward this to a Friend >>>


History's first prank phone call was way back in ... 1884?
Unless it turns out that Alexander Graham Bell didn't really want to see Watson - that he was just goofing on the guy - then the first documented prank phone call would appear to have occurred about eight years after that famous 1876 exchange ... and at the expense of an undertaker in Providence, R.I. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WHITE PAPER: Silver Peak Systems, Inc.

Top 8 WAN Optimization Vendors Rated and Ranked
Limited bandwidth, long distances and poor network quality prohibit cost reductions for today's critical IT initiatives. Your IT organization needs WAN optimization that can be deployed anywhere, on any platform, and for the lowest cost. See how the new Gartner Magic Quadrant for WAN Optimization Controllers can help. Read now.

Cisco mobility bundles target BYOD, mobile virtual desktop
Cisco announced yesterday three pre-tested bundles of products and services designed to cut through the confusing complexity of enterprise mobility. Read More

Whose high-tech exec job hinges on the presidential election?
There are a ton of high-tech managers and regulators in the federalgovernment who may be changing jobs come November Read More

Hospital system pursues identity-management Holy Grail
It's an ideal in identity management: a centralized role-based access control system that supports single-sign-on (SSO) user access to authorized applications tied into the human resources systems for automated provisioning and de-provisioning, and the ability to integrate physical-security identity badges for room access. Read More

Smartphone security is heading for 'apocalypse'
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an "apocalypse." Read More


WEBCAST: Dell

Today's NAS: A Solution Beyond Old Limits
Traditional NAS systems don't scale beyond fixed limits. Proliferation of NAS systems leads to management challenges. Many organizations also use traditional block-based SAN solutions for transactional systems like databases and email. Having separate block and file storage also adds to management challenges. Learn More

Netgear Adds to Its 802.11ac Lineup
Netgear's first 802.11ac router, the R6300, will go on sale next week for $200, the company announced at a news conference yesterday. Touting the benefits of the next-gen Wi-Fi standard, the company also announced two more 802.11ac products: a lower-end router and a USB adapter for notebooks, both due this summer. Read More

Google's new Knowledge Graph: Three key features
Google today unwrapped the first part of its efforts to overhaul its search engine capabilities to incorporate more semantic search capabilities. Here are three of its key features. Read More

Verizon to Kill Unlimited Data for All Users, Offer Shared Data Plans
In Verizon's quest to kill unlimited data, even customers with "grandfathered" plans are on the chopping block. Read More

FBI finds scammers impersonating the FBI now one of worst online threats
In a weird turn of events the most common Internet crime complaints in 2011 were those involving scams that involved fraudsters pretending to be the FBI according to the yearly online crime report issued through the FBI's partner, the Internet Crime Complaint Center (IC3) and the National White Collar Crime Center (NW3C). Read More


WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

Juniper to license Radware tech for data center?
Juniper Networks is negotiating a deal with Radware to license application delivery controller technology from the company, according to investment firm Oppenheimer & Co. Read More

Researchers trying to solve wireless network capacity puzzle
(Graphic: Christine Daniloff, via MIT) Read More

Microsoft anti-bloatware service to apply to Windows 8 PCs, too
A Microsoft in-store program that scrubs "bloatware" from Windows PCs will also be offered when Windows 8 machines reach the market later this year, a company representative said. Read More

Big Data Analytics Gold for the Call Center
There's valuable data in those contact center logs that have largely been gathering dust, and companies are using new tools to mine them to boost customer satisfaction and revenue and lower costs. Read More



SLIDESHOWS

10 ways to make Android faster, more productive and more secure than iPhone
iPhone users love to brag about their phones. Yet, for many users, Android is clearly the superior platform.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. This is why people pirate Windows
  2. The fantastic world of Steampunk technology
  3. T-Mobile now champions competitive balance
  4. Tech managers aren't doing a good job developing IT talent
  5. SOPA supporters meet in secret to strangle Internet freedom & online speech
  6. Forrester outlines 5 rising, 5 declining security technologies
  7. Angry Birds tops companies' app blacklist
  8. Verizon LTE expansion continues with 28 more cities
  9. A secure BYOD policy at MasterCard? Priceless.
  10. Can Apache OpenOffice still compete with LibreOffice?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: