Wednesday, May 29, 2013

IDC: PC sales being crippled by tablets; Windows 8 part of the problem

Beach reads for techies 2013

Cisco edges F5 in VPN shootout

Network World Daily News AM
May 29, 2013
Share this email

IDC: PC sales being crippled by tablets; Windows 8 part of the problem

The PC may not be dead, but it's not doing well.

READ MORE
 

Issue highlights

1. Beach reads for techies 2013

2. INSIDER Cisco edges F5 in VPN shootout

3. Review: VMware's vCenter Operations Manager lightens the load

4. 2013 Wireless Hall of Fame inductees range from GSM pioneers to ex-senator

5. Five steps to ultimate Firefox security

6. Calling all hackers: National Civic Hacking Day

7. How to Secure USB Drives and Other Portable Storage Devices

8. Opera browser for PCs reborn as Opera Next

9. Twitter's two-factor authentication implementation can be abused, researchers say

10. Apple to pay $53 million to settle class-action suit over iPhone and iPod touch warranties

RESOURCE COMPLIMENTS OF: VCE

Focus on business, not infrastructure

Vblock(TM) Systems from VCE provide innovative IT solutions that address common business pain points and provides faster deployment, significant lower cost per user and much higher availability. IT Executives are modernizing data centers and transforming operations with Vblock Systems to focus resources on speeding business value. Learn how converged infrastructure from VCE enables you to focus on your business, not your infrastructure.

Beach reads for techies 2013

IT folks talk about what they plan to read this summer -- and on which device. (Print, your days are numbered.) READ MORE

INSIDER

Cisco edges F5 in VPN shootout

Connecting remotely to network servers is a fact of life for millions of end users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity. READ MORE

Review: VMware's vCenter Operations Manager lightens the load

Monitoring virtual servers for availability, performance, health, and workload capacity has never been easy, but Operations Manager goes a long way toward that goal READ MORE

WHITE PAPER: HP

6 Steps to Application Performance Optimization

Poor application performance can cost more than you think. In fact, Enterprise Management Associates reports that it can exceed $1 million per hour in large enterprises. Read Now!

2013 Wireless Hall of Fame inductees range from GSM pioneers to ex-senator

The Wireless History Foundation (WHF) has named four new inductees into the Wireless Hall of Fame, honoring their efforts in areas such as building the first GSM networks. READ MORE

Five steps to ultimate Firefox security

Over the years, many have touted Mozilla's Firefox as one of the most secure Web browsers. But as with other browsers, the security level offered depends on the settings. Some security features need to be manually enabled. Those turned on by default should still be double-checked. READ MORE

Calling all hackers: National Civic Hacking Day

After it was revealed that the US government is the biggest buyer of zero-day vulnerabilities, companies like Google and Facebook that pay "bounties" to security researchers for reported bugs admitted they are "hard-pressed to compete financially with defense-industry spending." PayPal started a bug bounty program last summer and listed cross-site scri READ MORE

WHITE PAPER: IBM

Next-Generation Customer Experience Management

This Aberdeen Analyst Insight provides an overview of the top factors driving 2013 customer experience management (CEM / CXM) programs. Learn More.

How to Secure USB Drives and Other Portable Storage Devices

For all their convenience, misplaced or stolen storage devices often result in the loss of confidential data. To protect against embarrassing, costly and damaging data breaches, take these steps to protect your employees' portable storage devices. READ MORE

Opera browser for PCs reborn as Opera Next

The new Opera Next 15 beta is the re-imagined and slimmed-down version of Opera's desktop browser. This release comes on the heels of the company's revamp of Opera 14 for Android. READ MORE

Twitter's two-factor authentication implementation can be abused, researchers say

Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure. READ MORE

Apple to pay $53 million to settle class-action suit over iPhone and iPod touch warranties

Apple has agreed to pay US$53 million to settle a class-action suit in connection with warranties for its iPhone and iPod touch devices. READ MORE

WHITE PAPER: IBM

Gaining and Executing a Smarter Understanding of Customers

This article discusses the urgent need for firms to successfully engage with customers, including handling issues such as social media and mobility, and at accomplishing this goal with smarter IBM collaboration and CRM solutions. Learn More.

SLIDESHOWS

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. DOJ lays out cybersecurity basics every company should practice

2. Apple iWatch; What we know so far

3. Commission wants to turn tables on IP thieves

10. Public cloud shakeup: VMware in, Dell out and OpenStack in limbo?

8. iPhone 6 rumor rollup for the week ending May 24

9. Java developer says he built, launched basic open source suite in 30 days

7. Products of the week 5.27.13

4. iPad 5 rumor rollup for the week ending May 23

6. The hidden dark side of today's hottest tech trends

5. 3D printing saves a life

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment