Monday, July 30, 2012

Leaked Windows Phone 8 SDK brings app surprises

  Products of the week 7.30.12 | The 9 most endangered species in IT
 
  Network World Daily News PM

Forward this to a Friend >>>


Leaked Windows Phone 8 SDK brings app surprises
The full Windows Phone 8 SDK has been leaked online, and while Microsoft has disclosed a considerable amount of information on the next version of its smartphone OS, there were a few surprises to be had. The SDK comes with a version of Visual Studio Express for Windows Phone. It only installs on a 64-bit version of Windows 8 and only on real hardware. That's because it comes with its own hypervisor... Read More


RESOURCE COMPLIMENTS OF: RIM

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WHITE PAPER: Citrix Systems

2x consolidation for less than F5. Shift up to the Cloud
Pay more to get less consolidation? How dense does F5 think you are? Shift to Citrix NetScaler. 2x consolidation—for less. Don't compromise your consolidation project. The Iron Age is over. The Cloud Age is here. Learn how virtualization streamlines your datacenter and consolidates network resources. Learn More

Products of the week 7.30.12
Our roundup of intriguing new products, including Lieberman Software, VSS Monitoring and Proximal Data Read More

The 9 most endangered species in IT
The IT job landscape is evolving quickly. Here's how to avoid IT extinction Read More

Getting out in front of BYOD
It wasn't long ago that BYO was something you'd find on a party invitation. But with the wave of employees bringing their own smartphones and tablets into the workplace and expecting to use them for email, network access and mobile apps, BYOD -- or "bring your own device" -- now represents a promising but formidable business trend that doesn't leave IT in the mood for celebration. Read More

What's next for cellular? Try Wi-Fi
A perception exists that a network war is unfolding in the enterprise, with Wi-Fi facing off against up-and-coming cellular services, specifically 4G. Read More

Black Hat: Researcher pinpoints promising ways to attack Windows 8
Windows 8 offers some promising opportunities for attackers, but overall is a much more secure operating system than its predecessor, a researcher told the Black Hat conference. Read More


WHITE PAPER: Dell VMware

Taking a Proactive Approach to Patch Management
Outline best practices that can be implemented to ensure your organization can address security proactively, rather than having to react and use valuable resources when viruses, malware or worms attack. Learn More Now!

First strain on Olympic networks seen
It didn't take long to see the first signs of strain on communication networks at the Olympics when overloaded infrastructure on the first day of competition caused organizers to request that spectators scale back their use of Twitter for "non-urgent" messages, according to Reuters. Read More

Oracle buys Xsigo for software-defined networking
Oracle said Monday it has inked a deal to buy software-defined networking vendor Xsigo Systems, in a move that will support Oracle's ongoing foray into cloud computing. Terms of the acquisition, which is expected to close within a few months, were not disclosed. Read More

Advance Malware Protection: Network or Host?
Large organizations have legitimate cause for concern. Malware creation and proliferation is increasing rapidly as cybercriminals and state-sponsored organizations create the next round of APTs, botnets, Trojans, and rootkits. What's more, we've entered the era of micro attacks designed to compromise a targeted organization, business unit, or individual. Read More

Persistent router botnets on the horizon, researcher says at Defcon
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Read More

INSIDER
Finding the Talent Your Business Needs
How CIOs are meeting the challenge of a small high-tech pool by making the most of the teams they have Read More


WHITE PAPER: Silver Peak Systems, Inc.

Send Less Data across the WAN
Because WAN deduplication works on all IP traffic, it plays a key role in a variety of IT initiatives including server consolidation, virtualization, and application delivery. Learn how this proven technology can dramatically improve the performance, reliability, and efficiency of data backup and recovery. Learn more.

7 Steps to Happy Hires With Longterm Potential
Reed Technologies is among the rare companies that has recruit-and-retain down to a science. Here are 7 lessons from their strategies that you can use to build your own homegrown talent pool Read More

Apple roars about OS X Mountain Lion downloads topping 3 million
Never one to shy away from touting positive milestones, Apple announced Monday that its OS X Mountain Lion software has topped 3 million downloads in just four days, the fastest sales start ever for one of its OS X releases. Read More

The 15 Best Android Widgets
These useful widgets should be on your Android home screen. Read More

Fully assembled iPhone 5 leaked, most detailed insight yet [Video]
New images have emerged showing what could be a fully assembled iPhone 5. Many experts are calling the photos the most detailed, authentic-looking images of the upcoming iPhone we've seen. Read More

NSA chief asks hackers at Defcon for help securing cyberspace
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. Read More

Hosted IP telephony maturing for mainstream enterprise adoption
IP telephony adoption has progressed slowly for more than a decade, but with hosted voice vendors now offering modular consumption models and shifting away from simply viewing hosted voice as a way to sell broader unified communications (UC) solutions, organizations can now pursue IP telephony services as a highly scalable stand-alone service. Read More

 
 
 

SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 new network features in Windows 8
  2. How to watch the Olympics on the Internet
  3. Europe's supply of IPv4 addresses nearing depletion
  4. Researcher creates proof-of-concept malware that infects BIOS, network cards
  5. iPhone 5 rumor rollup for the week ending July 27
  6. The 5 hottest IT jobs right now
  7. The day VMware ate Cisco
  8. Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
  9. Quirkiest moments at 2012 Black Hat security conference
  10. Microsoft announces new hardware for Windows 8
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment