Thursday, July 18, 2013

Ballmer's chance of changing Microsoft? Don't bet on it

4 Things CIOs Need to Know About Microsoft's Reorg | Microsoft cites constitutional rights to lift gag orders, tell public about gov't spying

Network World Microsoft

Forward this to a Friend >>>


Ballmer's chance of changing Microsoft? Don't bet on it
Microsoft's attempt to transform its dog-eat-dog corporate culture into a kinder, gentler cooperative climate is likely doomed, an expert in failed business strategies said today. Read More


WHITE PAPER: Biscom, Inc.

Improve File Transfer Efficiency by 98% with added Security
This case study from SpaceX replaced their aging FTP server with Biscom Secure File Transfer (SFT) and improved efficiency by 98%. You can too. Learn More.

WHITE PAPER: Condusiv Technologies

Lab report: V-locity VM Accelerates Exchange 60% on VMs
For this briefing, openBench Labs tested the ability of V-locity VM to optimize I/O in a dedicated email service domain centered around a VM running Exchange 2010. Read Now!

4 Things CIOs Need to Know About Microsoft's Reorg
The entirely expected Microsoft reorganization, and the accompanying memo from CEO Steve Ballmer, suggests that the company plans to focuses on devices, the cloud and a much shorter development life cycle. This will have a major impact on how your IT department operates. Read More

Microsoft cites constitutional rights to lift gag orders, tell public about gov't spying
Microsoft denied giving the feds 'direct access' to customer data and appealed to the U.S. Attorney General to lift the secrecy ban based on constitutional guarantees. Read More

Why the Xbox One could be a hit with businesses
A breakdown of the Xbox One's workplace benefits. Read More


WHITE PAPER: Netscout Systems Inc.

Adopt a More Service-Oriented Management Strategy
The survey results in this report demonstrate dramatic changes happening in IT service management delivery and highlight best practices to assure performance of business processes, deliver exceptional end-user experiences, optimize existing infrastructure, and speed the deployment of new technologies and services. Learn More.

Microsoft researcher on 'special class of user/adversary:' children
Next week at the SOUPS 2013 security and privacy conference in England, Microsoft researcher Stuart Schechter will discuss his latest paper entitled: "The user IS the enemy, and (s)he keeps reaching for that bright shiny power button!" The subtitle reads: "The security and privacy impacts of children and childhood on technology for the home." Read More

Microsoft denies giving government open access to customer data
Even as it seeks more freedom to discuss how it turns over customer data to the government, Microsoft is revealing details that don't violate laws meant to keep such transfers secret. Read More

Apple, Microsoft to leap on app auto-update bandwagon
By this fall, Apple and Microsoft will have followed in the footsteps of Google to automatically update apps on their mobile and desktop platforms, another move to take security out of users' hands. Read More


WHITE PAPER: IBM

Take Your Social Business Relationships to the Next Level
This IBM Redguide publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. Learn More.

Citrix edges VMware, Microsoft in VDI face-off
We compared hosted virtual desktop infrastructure (VDI) products from Microsoft, Citrix, VMware, Oracle and Ericom and came to many conclusions, but the most important one is this: Setting up hosted desktop sessions in a BYOD world is a complex undertaking. Read More

Is Microsoft starting from scratch with Windows Phone 9?
A Russian blog says Microsoft will go back to the drawing board with Windows Phone 9, but that will involve a lot of risk on Microsoft's part. Read More

Microsoft must embrace 'grim option' of Windows cannibalization
Microsoft must be ready to accept, as has Apple, that it's better to cannibalize its own sales than to let competitors do it. Read More


SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco building an Internet of Everything router: Chambers

2. Small, electric-powered nano-lasers may help keep Moore's Law valid

3. How Google and Blue Box sparked an important open source discussion

4. Hijacking Office 365 and other major services via cookie re-use flaw

5. New digitally signed Mac malware confuses users with right-to-left file name tricks

6. Can your IP address give away your identity?

7. Petition calls for an end to passwords

8. What IT recruiters know about you -- whether you're looking or not

9. Death of India's telegram system

10. Bill Gates vows the return of Microsoft Bob


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: