Monday, June 16, 2014

How the Mac is invading the enterprise

A visual history of OS desktop environments | Privacy win: Cops need a warrant to track your cellphone location

Network World Voices of Networking

Forward this to a Friend >>>

How the Mac is invading the enterprise
A combination of consumerization, BYOD, and influence of the Bay Area's tech giants are giving the Mac a boost in the enterprise. Read More

WEBCAST: Aerohive

Understanding the Network Impact of 802.11ac
Watch this webinar recording featuring Forrester Research for an overview of the current 802.11ac technology, a discussion on how high-speed Wi-Fi & application control impacts your network architecture, and take a look at how a proper network strategy can save you 40% or more on your investment. View Now>>

WHITE PAPER: Ipswitch, Inc

5 Ways to Ensure Wireless Networks Keep Up With Demand
Discover five ways in which you can keep up with the ever-increasing demands on your wireless networks. Learn More >>

A visual history of OS desktop environments
A trip down memory lane, tracing major milestones in the evolution of the desktop environment. Read More

Privacy win: Cops need a warrant to track your cellphone location
Judges in Florida recently ruled that U.S. citizens' cellphone location data cannot be collected without a warrant. Read More

The real cost of the sharing economy
Enormous valuations for sharing startups Uber and AirBnB signal a huge shift in value from production to aggregation. Read More

Cisco CEO Chambers to retire this fall?
Cisco CEO John Chambers may retire this fall amidst a massive reorganization that could lop tens of thousands of employees off its workforce. So says Scott Raynovich, author of the tech/business sheet The Rayno Report. Read More


Who does NSS Labs "Recommend" for NGFW?
In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked improvement" and bestowed their "recommended" rating on 6 vendors. Click here to find out who they were. Learn more >>

Final thoughts from Cisco Live: You can't manage what you can't see
Some takeaways from Cisco Live, including the importance of network visibility and automation. Read More

Microsoft developing smartphone batteries that can last a week
It will require changes in both software and battery design, but Microsoft Research thinks it can be done. Read More

Hackers use pathetic passwords just like everyone else
It turns out that many hackers employ the same weak password techniques as the least technologically savvy among us. Read More

iOS 8 adds incredible new Time-Lapse video feature
This new feature of the iOS 8 Camera app didn't get any attention at Apple's WWDC 2014, but it's exciting nonetheless. Read More


Analytics in the Hands of Everyone Who Needs It
Right-sized for individuals, workgroups or enterprises, each Cognos family member offers BI and performance management to address your company's needs. Read Now

ISPs signed up Broadband for America members without their knowledge
A group opposed to net neutrality is made up of seemingly random organizations that have no recollection of signing up as members, and in some cases aren't even aware of the net neutrality debate. Read More

How to orange juice-proof your iPhone
A handful of services will water-proof your iPhone, tablet, and even your drone. Read More

Nokia shows off foldable, flexible displays
Unfortunately for Microsoft, this branch of Nokia isn't heading to Redmond. Read More

California Chrome owner can kiss Google endorsement goodbye
It didn't take much horse sense to sniff out (with our without a nose patch) a possible marketing opportunity between race horse California Chrome and web browser Google Chrome, which of course comes out of one of the hottest California companies around. Read More

Big data security analytics can become the nexus of information security integration
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response. Read More


Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Behind the Great Firewall: What it's really like to log on from China

2. Docker 101: What it is and why it's important

3. A visual history of OS desktop environments

4. What's the best approach to building next-generation data center networks?

5. How to Clean Up Your IT Resume

6. This IT worker had to train an H-1B replacement

7. 10 countries that pay you what you're worth

8. HP unveils Cisco-like SDN switch

9. Microsoft withholds monster IE update from Windows 8.1 dawdlers

10. Microsoft Azure service lets IT control identity and access management to select applications

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: