Microsoft trots out tired euphemisms for '18,000 people are losing their jobs' | How the FCC's in-school Wi-Fi program could affect vendors | |||||||||
Network World Voices of Networking | |||||||||
What's missing from Apple's big enterprise deal with IBM? WHITE PAPER: APC by Schneider Electric Owning vs. Outsourcing Data Center Physical Infrastructure When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail collocation data center, there are both quantitative and qualitative differences to consider. This paper discusses how to assess these key factors to make a sound decision. Learn more! In this Issue
WHITE PAPER: VCE Swiss Nuclear Power Plant Improves Business Continuity This case study explains why KKL chose VCE VblockTM Systems, how they configured the system, and how they were able to transform their twin data centers to ensure a highly-available, resilient operation in just two months. Learn More Microsoft trots out tired euphemisms for '18,000 people are losing their jobs' How the FCC's in-school Wi-Fi program could affect vendors The FBI is both worried and excited about driverless cars Why password managers are not as secure as you think How smuggling is behind the latest spec in smartphones : VCE The Cornerstone of New In-House IT Operation for CP Railways As part of this sweeping transformation, Canadian Pacific Railways (CP) took a fresh look at its outsourced IT and decided to bring the entire operation in-house. After evaluating various options, CP chose Vblock Systems from VCE to virtualize its extensive suite of business-critical SAP applications and other business solutions. Learn More 'Six Californias' lunacy looks headed for ballot Would Jobs have made IBM deal? Not in '95 Google's smart contact lens is not what it sounds like Bitcoin company bought Buttcoin.org site just to delete critical reviews Oracle saddles up with OpenStack distributor Mirantis WHITE PAPER: APC by Schneider Electric Classification of Data Center Infrastructure Tools This paper divides the realm of data center management tools into four distinct subsets and compares the primary and secondary functions of key subsystems within these subsets. Learn more! How a '70s technology is stopping smartphone progress
and why that might change soon Microsoft to axe Nokia feature phones amid massive layoffs Microsoft researchers: Re-use the same password across sites likely to be hacked Everyone - not just IBM and Apple - is talking about mobile apps Russian hackers breach CNET, steal one million usernames, passwords & email addresses Researchers: 'Untraceable' and 'unstoppable' attacks on the Internet through TVs SpeechTrans Wristband Watch : A small step towards the Babel Fish | |||||||||
Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark. SLIDESHOWS Worst data breaches of 2014 So far We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. Cisco customers are brutally consolidating too 2. Microsoft to lay off 18,000 in next year 3. 10 Web Services That Make Your Life Easier 4. Say goodbye to desktop phones 5. 17 obscure Windows tools and tricks too powerful to overlook 6. Microsoft may announce its biggest layoffs ever on Thursday 7. Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s 8. Ubuntu 14.04: Is Canonical taking on too much 9. 10 disturbing attacks at Black Hat USA 2014 10. Microsoft researchers: Re-use the same password across sites likely to be hacked | |||||||||
Do You Tweet? You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
No comments:
Post a Comment