| 25 most commonly used and worst passwords of 2014 | Microsoft to release Office 2016 later this year |
|Network World Voices of Networking|
WHITE PAPER: Apperian
Choose an Enterprise App Store Strategy
In this research report Gartner outlines how organizations can optimally secure, distribute, and manage mobile applications for employees and contracted workers. Learn More
In this Issue
WHITE PAPER: IBM
Advanced Case Management Leadership Guide
A guide that examines how IBM Case Manager offers an extensible platform for enhancing capabilities and protecting investments with additional value-added ECM capabilities from IBM, as well as industry-specific case management applications and best practices from IBM Business Partners. Read Now
Apple's original Apple Watch... from 1995
10 things the next version of Google Glass must have
Google stopped making Glassholes, not Google Glass
WHITE PAPER: iDashboards
Georgia Institution Stretches Budget with iDashboards
Dalton State College needed a dashboard solution that would assist them in summarizing, presenting and monitoring higher education metrics. They were able to efficiently convert their Fact Book, which usually took six weeks to finish, into dashboards to make more informed, timely decisions. Learn More
Drug-delivery drones are more common than you'd think
Illinois schools can legally demand students' social media passwords
IDG Contributor Network: Watch out for an upcoming leap second
WHITE PAPER: Box
A Mobile Security Checklist
Today's most productive employees are not tied to a desk. These top producers are experts at finding new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with easy, reliable, 24/7 access to information, from anywhere in the world. Learn more!
Scared of 802.11AC Wave 2 Wi-Fi? Here comes Cisco Multigigabit to the rescue
Hackers could exploit security holes in Progressive Insurance Snapshot devices
Changes to Patch Tuesday underscore bigger shakeup in Microsoft security
Cyberwar games: Finally something that might help keep us secure
A look back at the most memorable tech-related happenings of 1990.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Do You Tweet?
You are currently subscribed to networkworld_voices_of_networking as email@example.com.
To contact Network World, please send an e-mail to firstname.lastname@example.org.
Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly, send an e-mail to email@example.com. **