Friday, January 04, 2013

CES 2013: Hottest products to watch for

  Netflix open sources Janitor Monkey to help tidy up unused Amazon cloud resources | IMAGiNE: Once-prolific movie piracy leader slapped with 5 year prison sentence
 
  Network World Daily News PM

Forward this to a Friend >>>


CES 2013: Hottest products to watch for
The stuff we're eager to get our grubby little hands on at this year's CES. Read More


WEBCAST: Oracle

A Winning Analytics Formula
Watch this Webcast and you will have the opportunity to experience a live demo of the analytics dashboard. It's a great opportunity to see what analytics can do for your business Learn More

WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Netflix open sources Janitor Monkey to help tidy up unused Amazon cloud resources
Online video streaming company -- and heavy Amazon cloud user -- Netflix has open sourced Janitor Monkey, a tool that finds unused cloud resources and deletes them, leading to potentially valuable cost savings for customers. Read More

IMAGiNE: Once-prolific movie piracy leader slapped with 5 year prison sentence
The acknowledged leader of once prolific movie piracy group IMAGiNE was sent to prison today for five years, one of the longest sentences ever handed down for criminal copyright infringement. In addition to his prison term, Jeramiah Perkins, 40, of Portsmouth, Va., was sentenced to serve three years of supervised release and ordered to pay $15,000 in restitution. On Aug. 29, 2012, Perkins pleaded... Read More

10 third-party alternatives for 'missing' Windows 8 apps
We've sifted through the Windows Store to identify the best Band-aids for the most painful Windows Store no-shows. Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Toyota to show off autonomous prototype car at CES show
Toyota is going to show off its autonomous car/accident avoidance technology at the 2013 Consumer Electronics Show (CES) in Las Vegas nest week. Read More

Apple's Pandora competitor to launch in 2013 says analyst
A few months back, Bloomberg reported that Apple was in serious talks with a number or major record labels in an effort to secure licensing deals for a music streaming service similar to Pandora. The initial report relayed that Apple was hoping to launch the service - which would be supported by advertising - by early 2013. After all, if Apple was able to provide a comparable music experience to Pandora,... Read More

Chrome, Firefox, IE to block fraudulent digital certificate
Google, Microsoft and Mozilla announced on Jan 3 that they are revoking trust in two digital certificates accidentally issued by Turkish certificate authority (CA) TURKTRUST. When you start talking about another CA fiasco, there are many people whose eyes glaze over when reading technical details because they know it's bad, but really have no idea why it is so dangerous for digital certificates that... Read More


WHITE PAPER: Brocade Communications

Universities Face Big Data Test
Big Data will help university stakeholders make better-informed decisions across the board, from student recruitment to day-to-day operations. To carry that Big Data, Ethernet fabrics and software-defined networks are stepping up to help institutions build flexible and resilient network topologies. Learn more.

Thinking of a counterattack? Deception is better, say experts
Security experts say counterattacks are simply asking for more trouble, since they could promote an escalating series of attacks, and it is possible to attack the wrong villain because of the attribution problem. Read More

Could China blocking VPNs lead to spying on business?
The "Great Firewall of China," designed to prevent its citizens from accessing some overseas content, has apparently undergone an upgrade. Read More

Mobile devices set to become next DDoS attack tool
Unless mobile device security is vastly improved, smartphones and tablets are expected to become a significant launching pad for distributed denial of service (DDoS) attacks against corporate websites, a research firm says. Read More

US frowns on Eric Schmidt's North Korea trip
The U.S. Department of State has described the timing of a proposed visit by Google's executive chairman Eric Schmidt and others to North Korea as not "particularly helpful" in view of the Asian country's recent launch of a long-range rocket. Read More

Dell may wait until end of year to launch OpenStack public cloud
Dell may wait until the end of this year to launch its anticipated OpenStack-powered public cloud, a vice president with the company told Network World sister site ITWorld, a move that puts the company behind other big-name vendors that are already executing on their cloud strategies. Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Best tech colleges are harder than ever to get in
  2. Google finds unauthorized certificate for google.com domain
  3. Court sides with Amazon regarding Apple's allegation of false advertising
  4. Cisco, others eyeing $3.7 billion SDN market
  5. How long will big-name customers like Netflix put up with Amazon cloud outages?
  6. Cloud computing, mobile ushering in "major shift" for security practices
  7. Gartner: Top 10 cloud storage providers
  8. Microsoft Patch Tuesday: Just two critical fixes but they affect a lot of Windows systems
  9. Technologies to watch 2013: Cisco products, more maturity for SDNs
  10. Cloud security to be most disruptive technology of 2013
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment