Thursday, December 06, 2012

How the fiscal cliff affects IT

  Top tech M&A deals of 2012 | ITU says "network outage" after website cyberattack disrupted Dubai conference
 
  Network World Daily News PM

Forward this to a Friend >>>


How the fiscal cliff affects IT
Since the election, the political news cycle has revolved around the impending "fiscal cliff," a perfect storm of tax increases and government spending cuts set to take effect on Jan. 2, 2013. Although the IT industry may not have paid much attention, it's just as susceptible to the policy changes as the rest of the economy. Read More


RESOURCE COMPLIMENTS OF: Verizon Wireless

Verizon M2M technology helps transform businesses.
Verizon offers customizable, scalable, end-to-end machine-to-machine (M2M) solutions. Only Verizon has the expertise, industry-specific knowledge and high-performance 4G LTE network to develop and deploy integrated solutions to meet the needs of your business. And the Verizon Machine to Machine Management Center helps you monitor and control your deployment from a single, easy-to-use portal.

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

Top tech M&A deals of 2012
A summary of who did the buying, who got bought, how much they went for and why. We'll be updating as more deals are made. Read More

ITU says "network outage" after website cyberattack disrupted Dubai conference
The International Telecommunication Union (ITU), the UN body that has played a standards-setting role for global telecommunication networks over the decades, Wednesday night suffered a website attack that severely disrupted a conference to discuss its Internet influence. Read More

Apple products coming to T-Mobile USA in 2013
It looks like the iPhone will finally be coming to T-Mobile USA. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

New Aruba Wi-Fi controllers dissect WLAN traffic
New Aruba Networks controllers scale more than ever, and let IT groups dissect and optimize WLAN traffic by application for each user. Read More

Another start-up targeting SDNs, Cisco's dominance
They are coming out of the woodwork. Another SDN start-up has cropped up, this one north of the border in Canada. Read More

Six free databases with commercial-quality features
Microsoft, Oracle offer impressive free versions of their commercial offerings, but MariaDB wins our test Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Can Microsoft Survive If Windows 8 Fails?
Microsoft is betting the farm on the success of Windows 8--its new and radically different operating system. Read More

RIM offers free BlackBerry 10 smartphone
Research in Motion Thursday introduced the BlackBerry 10 Ready Program to help prepare business customers for the launch of the next-generation OS on Jan. 30. Read More

HTC-Apple agreement forbids cloning of Apple 'user experience'
A patent agreement between Apple and HTC forbids the Taiwanese company from making and selling mobile devices that copy what is described as the 'Distinctive Apple User Experience," according to a redacted version of the agreement filed in a California court. Read More

Best practices to close the door to spear-phishing attacks
Security firm Trend Micro has identified spear-phishing emails as a top vector for allowing advanced persistent threats (APTs) onto company networks. Attackers use personal information to gain a victim's confidence and then zap him or her with malware that can scout for and exfiltrate confidential data. Share these best practices with your colleagues to "avoid the spear." Read More

The Best Tablets for the Holidays
The tablet market is awash with iOS, Android and Windows 8 models that come in different sizes and with different features, specs and prices. How do you decide? Start with our Holiday 2012 Tablet Buying Guide, which highlights the top picks in 13 categories. Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. #DroidRage stunt brings Microsoft a world of hurt
  2. McAfee in Guatemalan jail cell, still 'blogging'
  3. A gift guide to please any geek ... 25 years ago
  4. 12 useful websites for IT security
  5. 'Everyone in US under virtual surveillance'
  6. Google Ingress: How to save the world with your Android phone
  7. Gartner: Amazon, HP cloud SLAs are 'practically useless'
  8. Cisco Catalyst 6500 vs. Cisco Nexus 7000
  9. 12 scams of Christmas and how to avoid them
  10. 2013 IT salaries: 15 titles getting the biggest pay raises
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: