Tuesday, July 02, 2013

6 rising open source stars

Creator of the hashtag explains why he didn't patent it

SDNs: 8 key considerations before you make the leap

Network World Daily News PM
July 02, 2013
Share this email

6 rising open source stars

Names you'll want to know in the free software/open-source world.

READ MORE
 

Issue highlights

1. Creator of the hashtag explains why he didn't patent it

2. SDNs: 8 key considerations before you make the leap

3. Microsoft updates mobile OneNote app

4. California's first data-breach report finds 131 incidents hit 2.5 million citizens

5. Gartner downgrades 2013 global IT spending forecast on currency shifts

6. Researchers mimic board game to bolster computer security

7. Study: Building a Business Case for SIP Trunks

8. We want to be surprised, CERN scientist says

9. Civil rights groups plan July 4 protest against NSA surveillance

10. Image gallery: Windows 8.1 deep dive review

WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP

This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More!

Creator of the hashtag explains why he didn't patent it

READ MORE

SDNs: 8 key considerations before you make the leap

Software-defined networks aren't for everybody. Through programmability and automation, they promise to make IT life easier. But depending on your IT shop, the benefit may not be worth the effort… or investment. READ MORE

Microsoft updates mobile OneNote app

Microsoft has updated the mobile version of its OneNote note-taking application for iPads, iPhones and Android devices, creating a consistent look for notes across all computers, smartphones and tablets in which they're viewed. READ MORE

WHITE PAPER: Tripwire

Five Tips for Outsmarting the Information Age Adversary

Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More

California's first data-breach report finds 131 incidents hit 2.5 million citizens

The state of California yesterday issued its first annual data-breach report saying for 2012 it recorded a total of 131 data breach incidents that put the personal data of more than 2.5 million Californians at risk. READ MORE

Gartner downgrades 2013 global IT spending forecast on currency shifts

Gartner has lowered its expectations for growth this year in global IT spending, saying it will rise 2 percent to US$3.7 trillion. Earlier this year, the analyst firm predicted 2013 growth of 4.1 percent. READ MORE

Researchers mimic board game to bolster computer security

By studying the memory game Concentration, they hope to lay the groundwork for highly accurate bot-detection programs READ MORE

WHITE PAPER: IBM

A Next Generation Computing Platform

This white paper discusses an important sea change happening in IT: the development of expert integrated systems. Learn More. Learn More.

Study: Building a Business Case for SIP Trunks

Today, we'd like to highlight an excellent study on how to build a business case for SIP trunking. The research, sponsored by Oracle, correctly notes that implementing SIP trunking is usually the third phase in an organization's conversion to Voice over Internet Protocol (VoIP), following the installation of IP-PBX and IP phones and then using VoIP/SIP to interconnect auxiliary voice communication... READ MORE

We want to be surprised, CERN scientist says

The Large Hadron Collider (LHC) is currently undergoing some major upgrades, which will bring scientists closer than ever before to the secrets of the universe when the particle accelerator is up and running again in 2015. READ MORE

Civil rights groups plan July 4 protest against NSA surveillance

A large coalition of civil rights and privacy groups and potentially thousands of websites will stage protests on the Fourth of July to protest surveillance programs at the U.S. National Security Agency. READ MORE

Image gallery: Windows 8.1 deep dive review

The preview of Windows 8.1 reveals an operating system that corrects many, but not all, of its previous mistakes. READ MORE

WHITE PAPER: F5 Networks

IT Consumerization - A Shift to App-centric Security

This paper examines how BYOD 2.0 builds on the BYOD 1.0 foundation but makes a substantial shift from a device-level focus to an application-level focus to reduce overhead and unburden IT by allowing them to concern themselves only with the enterprise data and applications they need to secure, manage, and control. Learn More

SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 biggest home networking mistakes (and how to fix them)

2. Microsoft shutters TechNet subscriptions

3. 10 things we love about Ubuntu 13, 5 things we hate

4. Meet the next open-source stars

5. The biggest security snafus of 2013 (so far)

6. Getting the most out of flash storage

7. The worst cloud outages of 2013 (so far)

8. VMware brain drain: Former sales chief moves on to Amazon's cloud biz

9. Stuart Biggs, the first Cisco CCIE, dies at age 53

10. A look at 22 Linux Foundation newbies

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: