Wednesday, November 19, 2014

15 can't-miss products at DEMO Fall 2014

Network World Mobile & Wireless - Newsletter - networkworld.com
  Cisco crashes the enterprise mobile party with new collaboration app | 12 security problems that EMV and tokenization won't solve

 
  Network World Mobile & Wireless  

15 can't-miss products at DEMO Fall 2014
DEMO Fall 2014DEMO has served as a launching pad for startups that have gone on to become some of the world's biggest companies, from Netscape Navigator and TiVo to VMware and Salesforce.com. With DEMO Fall 2014 set to kick off today, here are 15 new products to check out.MakeTimeImage by YouTube.comTo read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Flexera Software
 
Achieving Application Readiness Maturity
Is your Application Readiness Process Ready for Change? Learn how to identify where you can make improvements, analyze the steps needed to move up in maturity, and prioritize which steps are most critical, resulting in faster and more reliable application delivery, lower costs and decreased risk. Learn More

: Brother International Corp.
 
Virtual Training Programs for Remote Sales Agents
Vehicle Protection Plus can train their sales agents, and get them productive, regardless of location using OmniJoin web conferencing. Find out how. Learn More>>

Cisco crashes the enterprise mobile party with new collaboration app
Project Squared will let users strike up ad hoc team meetings with audio, video conferencing, file sharing and text chat Read More
 

 

INSIDER
12 security problems that EMV and tokenization won't solve
On Nov. 1 of next year, merchants that aren't ready to accept chip-based cards instead of the current magnetic-stripe cards will become liable for fraudulent transactions that today are covered by the credit card companies.To read this article in full or to leave a comment, please click here(Insider Story) Read More
 

 

No, Google Glass isn't dead
The accepted wisdom today among tech wags is that Google has given up on Glass. Oh, really? Read More
 


WHITE PAPER: OutSystems

Why IT Struggles with Mobility
This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions. Learn More

Senator demands answers about DOJ mobile phone surveillance planes
A program that reportedly tracks mobile phones from airplanes raises privacy concerns, Markey says Read More
 

2014 Holiday Gift Guide: The other NSA also knows what you want
The National Santa Agency's motto: "He Sees You When You're Sleeping, He Knows When You're Awake…" Read More
 

Fujitsu embeds data in LED light for smartphones to detect
Just aim a smartphone camera at a lit object and an app calls up relevant information Read More
 


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

U.S. government issues alert about Apple iOS "Masque Attack" threat
Three days after security company FireEye warned of an iPhone/iPad threat dubbed "Masque Attack", the U.S. government has issued a warning of its own about the the risk to Apple iOS devices. Read More
 

BlackBerry bolsters its enterprise pitch
BlackBerry announced a renewed enterprise focus on Thursday, including a partnership with Samsung that provides secure mobile software for certain Samsung Android smartphones and tablets. Read More
 

UC Berkeley, MIT and Stanford split $45M in cybersecurity policy research grants
The Hewlett Foundation has granted $15M apiece to the University of California at Berkeley, MIT and Stanford University to conduct cybersecurity policy research, bringing to $65 the total that the foundation has committed to such research over the next 5 years. According to the foundation, "The grants to MIT, Stanford, and UC Berkeley are intended to jump-start a new field of cyber policy analysis—generating a robust 'marketplace of ideas' about how best to enhance the trustworthiness of computer systems and appropriately balance rights of privacy, the need for data security, innovation, and the broader public interest."To read this article in full or to leave a comment, please click here Read More
 

10 hottest IT skills for 2015
The pace of job growth in IT may be slowing down, but it's still moving at a strong clip.A healthy 24% of the respondents to Computerworld's 2015 Forecast survey said that their companies plan to add more IT employees in the year ahead. While down from 32% and 33% in the previous two years, the fact that a number of employers still anticipate growth indicates that the prospects for expansion in the IT ranks are good.Moreover, the kinds of technical skills in high demand are those needed for enterprises in expansion mode, suggesting that organizations are continuing to invest in their IT infrastructures. Be sure not to miss:To read this article in full or to leave a comment, please click here Read More
 

New products of the week 11.17.2014
Our roundup of intriguing new products from companies such as F5 Networks and Dell Read More
 

 

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. 20-plus eye-popping Black Friday 2014 tech deals

2. The SWAMP: How to avoid the coming software armageddon

3. 10 hottest IT skills for 2015

4. Cool Yule Tools: Best techie gifts for 2014

5. The 10 mightiest supercomputers on the planet

6. Cloud computing's not-so-secret mission

7. 10 enterprise Internet of Things deployments with actual results

8. re:Cap of AWS re:Invent: 10 cool new Amazon cloud features

9. Mobile Pwn2Own: Windows Phone does well, iPhone 5S, Galaxy S5, Nexus 5, Fire Phone fall

10. Peeping into 73,000 unsecured security cameras thanks to default passwords


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: