Monday, December 10, 2012

‘Christmas gift for someone you hate: Windows 8’

  The season for quantifying enterprise happiness | Why did BlackBerry blacklist the 'Pooh' gang?
 
  Network World Voices of Networking

Forward this to a Friend >>>


'Christmas gift for someone you hate: Windows 8'
That headline runs atop a blog by MIT researcher and instructor as well as serial entrepreneur Philip Greenspun who ran Windows 8 through its paces and found it wanting in several areas. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

The season for quantifying enterprise happiness
Hitachi has a system that can analyze how happy your organization is and maybe even re-engineer it to make it happier! Read More

Why did BlackBerry blacklist the 'Pooh' gang?
A report surfaced earlier this week contending that BlackBerry OS 10 will include a list of 106 prohibited passwords designed to prevent the clueless from choosing the likes of 123456, blackberry, or the ever-popular "password" as their password. However, a RIM spokesman told me today that the list actually applies to BlackBerry ID universally, not only the upcoming operating system, and "has been... Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

What if Linux went closed source? Would you still use it?
When was the last time you downloaded source code? Seriously. Take a look at the applications you currently have running – your web browsers, office suites, terminals, graphics editors and the like. Have you ever downloaded the source code for any of them, made a change and recompiled? (Okay, all of you Linux-From-Scratch and Gentoo-ers can put your hands down.) Read More

How much would you pay for a Windows Surface Tablet?
I am not a Microsoft hater. I scoff when I read some of the articles recently about Microsoft being irrelevant and toast because of the post-PC era bringing a Windows Apocalypse upon us. I actually believe that if you are a top 3 player in a given category, you are successful. Microsoft will continue to be top 3 in a wide range of markets. Read More


WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

Time to Move Off Cisco Catalyst 6500 Non-E Chassis
The Cisco 6500 Ethernet switches were introduced in 1999 and have been deployed by more than 45,000 organizations. Cisco has continued to come out with additional supervisor modules and interface modules and larger power supplies to keep the switches current. However, now the original chassis are outdated and not supported by Cisco anymore. Cisco wants their customers to upgrade their 6500 chassis... Read More

Best practices to close the door to spear-phishing attacks
Security firm Trend Micro has identified spear-phishing emails as a top vector for allowing advanced persistent threats (APTs) onto company networks. Attackers use personal information to gain a victim's confidence and then zap him or her with malware that can scout for and exfiltrate confidential data. Share these best practices with your colleagues to "avoid the spear." Read More

'Everyone in US under virtual surveillance;' Are you sure you have nothing to hide?
"NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post," reported RT after interviewing William Binney. RT said this is being done under the "Terrorist Surveillance Program" which is probably better known as NSA warrantless wiretapping. But Binney also named and blamed the FBI this time: Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Why did BlackBerry blacklist the 'Pooh' gang?
  2. What if Linux went closed source? Would you still use it?
  3. How the fiscal cliff affects IT
  4. Gartner: Amazon, HP cloud SLAs are 'practically useless'
  5. Government board aims to revamp decrepit U.S. security classification system
  6. 12 useful websites for IT security
  7. McAfee reportedly may have had a heart attack
  8. Gartner: Growth in cloud computing to shape 2013 security trends
  9. RIM offers free BlackBerry 10 smartphone
  10. 12 essential Windows 8 keyboard shortcuts
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment