Monday, January 07, 2013

10 mobile startups to watch

  Hot CES 2013 videos | iPhone 6 rumor rollup for the week ending Jan. 4
 
  Network World After Dark

Forward this to a Friend >>>


10 mobile startups to watch
Read More


RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

One Day Tech Seminar - BYOD & Mobility Management
Attend and learn how to implement the top five corporate policies and security tactics that organizations must adopt to ensure they can mitigate risk while empowering a mobile workforce. BYOD & Mobility Management Tech Seminar. 2/12 - Westin Hotel, Long Beach, CA Click to continue

WEBCAST: Research In Motion

Banking On BlackBerry: Achieving Regulatory Compliance
In this webinar you'll learn how BlackBerry UCC helps financial services organizations stay productive and collaborative on their BlackBerry smartphones, while achieving regulatory compliance. Learn More

Hot CES 2013 videos
Watch our reports from the Las Vegas show Read More

iPhone 6 rumor rollup for the week ending Jan. 4
Obsession is its own reward, as the iOSphere constantly shows. The rumorati were gaga over a stock analyst's speculation that iPhone 6 would be available in, of all things, different colors. Read More

DARPA in search of a 100 Gb/sec wireless technology that can penetrate clutter
Talk about a high-capacity wireless network. Researchers at DARPA this week will detail a program - with over $18.3 million in funding behind it - that looks to develop wireless communications links capable of supporting 100 Gb/sec capacity at ranges of 125 miles for air-to-air links and about 62 miles for air-to-ground links from an altitude of 60,000 ft. Read More

Security Skills Shortage Is Impacting Incident Detection
I've been writing about the pervasive IT security skills shortage for the last few years and will continue to do so in 2013. I don't know why this critical issue doesn't receive more attention – you can mass produce antivirus software but until we can clone CISSPs, the security skills shortage will have an increasing impact on the state of cybersecurity. Read More

INSIDER
8 classic IT hiring mistakes and how to avoid them
From writing dated, irrelevant job descriptions to accepting a less-than-ideal candidate because the work is piling up, classic hiring mistakes are just waiting to trip up managers. Read More

Developer divide: 19 generations of computer programmers
If you're searching for a fountain of youth, the easiest way to get that feeling of continual rebirth is to hang around a few tech product launches. Every new rollout comes with the fresh, unabashed feeling that this has never been done before. Ever. Read More

Why I abandoned Windows Phone 8
A few months ago, I forced myself to switch to Windows 8 on my desktop system (and laptop) and ended up liking the operating system very much. Once I got used to the quirks and garish look of the new Start screen and learned many of the shortcuts built into Windows 8, I found myself enjoying the operating system and was more than pleased by its myriad of enhancements and performance improvements. Read... Read More

Thieves break into Microsoft HQ - steal only Apple products
Microsoft reports the theft of five iPads from its Mountain View office, all Microsoft equipment left un-stolen. Read More

Getting Ready for 802.11ac
Enterprise-class 802.11ac products won't appear in great numbers until around the middle of the year. But the handwriting is regardless on the wall - .11ac will indeed replace, over the next five years or so, 802.11n. That being said, I'm still encouraging clients to purchase 802.11n products if ROI, however measured, can be demonstrated over the next two years - and that's usually not a difficult... Read More

Wayward security certificates raise question of SSL reliability
As consumers, we've been taught to trust the padlock icon that appears on the address bar of our browsers. We're told it's a sign our communication with a website is safe. But an incident this week involving Google and a Turkish security company belies that notion. Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 10 free router and IP admin tools you should know about
  2. Video about ESD both shocking and funny
  3. Chrome, Firefox, IE to block fraudulent digital certificate
  4. DOD saves $100 million a year with new Microsoft licensing deal
  5. Samsung teases new TV design at CES 2013
  6. CES 2013: Products to watch for
  7. Cisco, others eyeing $3.7 billion SDN market
  8. Best tech colleges are harder than ever to get in
  9. Could China blocking VPNs lead to spying on business?
  10. Thinking of counterattack? Deception is better, say experts
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment