Issue highlights 1. A visual history of Linux 2. March Madness streaming-content bans don't apply to CEOs: study 3. Hackers can cause traffic jams by manipulating real-time traffic data, researcher says 4. Who had the 15th in March Madness press-release pool? 5. Please follow Network World on LinkedIn 6. Belkin closes Linksys acquisition 7. Watch the entire 48-minute Samsung Galaxy S4 presentation 8. Is Apple underestimating the threat posed by Samsung? 9. "Nobel Prize in Computing" goes to MIT crypto experts Goldwasser and Micali 10. The 10 greatest betrayals in high tech |
RESOURCE COMPLIMENTS OF: IT Roadmap Boston IT Roadmap is the one day, cost free, professional-level conference and expo that's full of job-ready solutions you can put to work now. IT Roadmap Boston is the place where IT leaders come to explore high-priority IT issues -- and learn how to meet today's requirements for anytime, anywhere business interactions. Click to continue |
The 10 biggest leaps forward in the look and feel of the Linux desktops READ MORE |
To ban or not to ban? The question comes up every year as March Madness approaches and companies fret about the potential for sluggish networks and lost productivity if employees tune in to games played during work hours. READ MORE |
Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat Europe. READ MORE |
RESOURCE COMPLIMENTS OF: InterMapper InterMapper provides an at-a-glance, real-time view of your network devices, services, applications, connections and traffic patterns. Drilling down on maps uncovers details needed to fix performance problems. It is an industrial strength monitoring, mapping and alerting tool that empowers network administrators to maintain healthy IT environments. |
So while I'm keeping one eye on an ESPN online gamecast showing Boston College vs. Miami in an ACC quarterfinal matchup, I receive what we believe is the first of what we are certain will be many press releases warning of the pending business apocalypse that is the NCAA men's basketball tournament, better known as March Madness. (Miami 43, BC 42 with just under 12 minutes left.) The PR pitch begins... READ MORE |
We invite you to follow Network World on LinkedIn, for a mix of stories and more info about your favorite enterprise network technology and business publication. READ MORE |
If you own a Linksys Wi-Fi router and were worried about receiving support for it or other gear after the company was sold to Belkin in January, you can breathe easier, at least for the foreseeable future. READ MORE |
WHITE PAPER: HP & Intel® In this eGuide, articles from Computerworld and InfoWorld offer case studies, examples and opinions of how HPC can be applied to real-world problems today, and what the future of the technology is likely to hold. Read Now! |
I realize that not everyone was glued to their computer screens last night or sitting in Times Square when Samsung launched its Galaxy S4 smartphone at Radio City Music Hall in New York. If you wanted to catch the event for the first time, or perhaps relive some key moments (tap-dancing boy on stage! Goofy fake actors!), we've got you covered. Here's the entire 48-minute event, courtesy of the livestream... READ MORE |
While the iPhone remains one of the more popular smartphones on the planet, it's undeniable that Samsung continues to eat into Apple's marketshare. Sure, Apple's iPhone sales are growing, but at a slower rate than what Apple has been accustomed to. READ MORE |
A pair of MIT professors and security researchers whose work paved the way for modern cryptography have been named winners of the 2012 A.M. Turing Award, also known as the "Nobel Prize in Computing." READ MORE |
Tech-minded backstabbers abound. Don't get caught this Ides of March with your back turned to the wrong vendor, partner, or customer READ MORE |
WHITE PAPER: MegaPath What steps can you take to manage network risks as mobile apps, social and the cloud invade your network? Read Now |
|
No comments:
Post a Comment