Wednesday, May 09, 2012

Tech debate: iOS vs. Android in the enterprise

FBI issues warning on hotel Internet connections | HP delivers power over Ethernet with all-in-one zero client

Network World Daily News PM

Forward this to a Friend >>>


Tech debate: iOS vs. Android in the enterprise
Apple iOS and Google Android have emerged as the two most popular operating system platforms for mobile devices, both smartphones and tablets. They are also both backed by rich development and application ecosystems. There are, however, pluses and minuses when it comes to enterprise adoption. Which one has the leg up? We went to a company, MEDL Mobile, that develops for both to give us the opposing views. Read More


RESOURCE COMPLIMENTS OF: LinkTek

Broken links during data migrations?
LinkFixerPlus is the first application that automatically fixes broken links in Excel, Word, PowerPoint, Access, PDF, PageMaker, AutoCAD, MicroStation and other files when performing data migration due to: server consolidation, server name changes, path name changes or folder reorganizations. Detailed broken link reporting too. Download your FREE trial version NOW!

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Your IT Career Roadmap
This unique session is designed with you, the IT professional in mind. How can you build your personal brand, and properly design a career plan? How do you work with your staff to create a plan that retains your best talent? Come to IT Roadmap Denver for valuable information on how today's IT leaders build successful careers. Click to continue

FBI issues warning on hotel Internet connections
The FBI today warned travelers there has been an uptick in malicious software infecting laptops and other devices linked to hotel Internet connections. Read More

HP delivers power over Ethernet with all-in-one zero client
HP has launched a new zero client which uses "one wire" technology to deliver power over Ethernet. Read More

US sets $1.4M to get unique metaphor-recognizing software system humming
An innovative project, called Autonomous Dynamic Analysis of Metaphor and Analogy, or ADAMA, aims to build a software system that can automatically analyze metaphorical speech in five different languages by analyzing huge quantities of online data got off the ground this week when the U.S. Army Research Laboratory awarded a $1.4 million contract to the team conducting the research. Read More


WHITE PAPER: Comcast

Bank Raises the Bar on Service Delivery with Comcast
Read this exclusive case study to learn how Comcast and Eastern Bank teamed to maintain a secure, reliable network infrastructure for transferring and protecting an enormous amount of data, including customers' bank account and credit card information, financial transactions, mortgage payments and payroll processing for their businesses. Learn More

Security of industrial control systems questioned at DHS conference
Operators of America's vital power, water and manufacturing facilities use industrial control systems (ICS) to manage them, and the security of these systems, increasingly linked with Microsoft Windows and the Internet, is now under intense scrutiny because of growing awareness that they could be attacked and cause massive disruptions. Read More

Police-themed ransomware starts targeting US and Canadian users
A ransomware application that locks computers and asks their owners to pay fines for allegedly violating several laws through their online activity is targeting U.S. and Canadian users, malware experts from security firm Trend Micro said on Wednesday. Read More

The iPad as a tool of orangutan liberation
Churning through the World Wide Web you come across tons of "cute iPad" stories -- this one from the Associated Press, with a very slight twist on a story that actually surfaced in January: apes using iPads. Read More


WHITE PAPER: Quest Software

Exchange 2010 and Your Audit Strategy
In this Quest Software white paper, discover how to easily understand and control who accesses your company's sensitive data. Learn to implement a strong Exchange 2010 audit strategy, and read about the options that give you the power to safeguard your company's vital information. Read it today. Read Now!

Cool old Ethernet paraphernalia
Ethernet is almost 40 years old. Here's a look at some of its product origins Read More

Hot Products at Interop 2012
Click through all the products being released at the Interop conference in Las Vegas this week Read More

The sizzling world of asteroids
From new space mining venture to causing the end of the world, asteroids are a hot topic Read More

Twitter resists subpoena to release user's data without warrant
Twitter is contesting a court order requiring it to turn over private data on a user charged with disorderly conduct during the Occupy Wall Street protests in New York last year. Read More

Free fraud protection scam delivers financial malware
In a new twist on FUD (Fear, Uncertainty, Doubt), a piece of financial malware called Tatanga, an online banking Trojan horse first discovered in May 2011, is promising security products to gain access to confidential personal information to steal identities and money. Read More



SLIDESHOWS

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The Patent Mafia and what you can do to break it up
  2. Verizon not launching voice over LTE anytime soon
  3. BlackBerry 10 OS will have multi-layered security model
  4. Hot products at Interop 2012
  5. How will Cisco COPE with SDNs?
  6. Who are tech's highest paid CEOs?
  7. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  8. 25 geeky gifts for Mother's Day
  9. Cisco nemesis Huawei to demo 96-port 100G Ethernet switch
  10. Next-gen firewalls: Off to a good start

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: