Issue highlights 1. Google Grim Reaper: The latest killed projects 2. "Tsunami" of bandwidth demand pushes IEEE 400G Ethernet standards process 3. How valuable are security certifications today? 4. No humor zone: 33 things you should never say to a TSA agent 5. 5 Misconceptions of Cloud Software and Virtual Licensing 6. 100GB of free cloud storage ... with a catch 7. BlackBerry details extensive security protection in BlackBerry 10 OS 8. Will Android users feel welcome in Facebook's Home? 9. More Apple iPhoneys: The iOS 7 edition |
RESOURCE COMPLIMENTS OF: CITE Conference Embracing consumer technologies for business advantage is a journey. Take the first crucial step at Consumerization of IT in the Enterprise (CITE) June 2-4, 2013 in San Francisco. Come Sunday for "The Consumerization Journey: A Readiness Assessment Workshop" led by Doug Neal and Jim Ginsburgh of CSC Leading Edge Forum. Learn more at www.citeconference.com |
The grimmest project, app, and API garrotes from Google's past eight reapings READ MORE |
The IEEE this week launched a study group to explore development of a 400Gbps Ethernet standard to support booming demand for network bandwidth. READ MORE |
When it comes to education, most people agree, more is better. No one embodies that principle -- at least in regard to IT certifications -- better than Jerry Irvine. CIO of IT consulting firm Prescient Solutions and member of the National Cyber Security Task Force, Irvine holds more than 20 IT certifications, of which at least six are specifically information security-oriented. READ MORE |
RESOURCE COMPLIMENTS OF: InterMapper InterMapper provides an at-a-glance, real-time view of your network devices, services, applications, connections and traffic patterns. Drilling down on maps uncovers details needed to fix performance problems. It is an industrial strength monitoring, mapping and alerting tool that empowers network administrators to maintain healthy IT environments. |
There is no humor in an airport. It's a fact. And while most travelers business or otherwise know that, there are a few out there who haven't gotten the message or perhaps the choose to ignore it. Either way the "People Say the Darndest Things" or "What Not to Say at an Airport" section has become one of the more popular destinations on the TSA Blog site. READ MORE |
Are you leaving money on the table by not optimizing your virtual or cloud environment to cut software licensing costs? Don't fall prey to these five common software licensing misconceptions. READ MORE |
A variety of cloud services offer free storage to get users signed up and on a path to become paying customers. Normally these free offers start at 2GB and range on up to maybe 10GB. READ MORE |
WHITE PAPER: PhoneFactor According to a leading analyst firm, phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Learn More |
The recent release of the BlackBerry 10 operating system sets the stage for a security evolution as well, according to Alex Manea, manager of security services at BlackBerry. READ MORE |
As you've no doubt heard by now, Mark Zuckerberg and his Facebook friends showed off the social network's hugely hyped new push into the mobile world at a media event held Thursday at the company's Silicon Valley HQ. And while some were no doubt disappointed that Facebook didn't release its own phone or re-branded fork of Android, the Home launcher should prove a lot more accessible to current Android users. READ MORE |
As Apple WWDC approaches, juices flow among would-be iOS designers READ MORE |
WHITE PAPER: Wildpackets How do you choose a network monitoring solution SNMP monitoring, flow-based monitoring, or packet analysis that is right for your IT infrastructure? This ebook your crash course in network monitoring for analysis and learn to use multi-segment analysis to diagnose performance problems with distributed application architectures. Download this ebook |
|
No comments:
Post a Comment