Search This Blog

Friday, June 19, 2009

Apple fans flock to buy iPhone 3G S; 10 unsung fathers of tech

Apple fans flock for iPhone 3GS; Google grabs 1M phone numbers; 10 unsung fathers of technology
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Brocade
rule

Deliver Web Application Security with No Compromise in Performance
Web applications have become the backbone of business in nearly every segment of the economy. They connect employees, customers, and partners to the information they need anywhere and anytime. This universal information accessibility has cut costs and dramatically accelerated the pace of business. Find out how Brocade and Imperva are working together to provide best-of-breed products.

rule

Spotlight Story
Apple fans flock to buy iPhone 3G S

The iPhone's magic is still there: The crowds turned out to see -- and buy -- Apple's iPhone 3G S early Friday morning as it launched around the world. Read full story

Related News:

Apple fans flock for iPhone 3GS; Google grabs 1M phone numbers
Apple still has iPhone magic. Crowds turned out to see -- and buy -- Apple's iPhone 3GS early Friday morning as it launched around the world. Also, Google last month reserved 1 million phone numbers with Level 3, signaling that it may finally be ready to roll out its long-anticipated Google Voice service. (5:50)

10 unsung fathers of technology
In the tech world, the inventor, originator or driving force behind a new product or technology is typically dubbed "father of the _______". As in Tim Berners-Lee, father of the Web. As in Vint Cerf, father of the Internet. As in Bob Metcalfe, father of Ethernet. Here, in honor of fathers everywhere, are some industry "fathers" you may not have heard of.

Internet2 names CTO
Internet2 has named Randy Frank as CTO, a job in which he'll help oversee the overall technology direction for the advanced networking consortium.

iPhone, Android and Storm hurt RIM's subscriber growth
BlackBerry maker, RIM, just reported it's first drop in subscriber growth since 2006 back when they were in patent litigation.

How to dramatically cut costs on network performance monitoring
The economic downturn and reduced IT budgets are forcing many network managers to look for alternative (read that as "cheaper") products and solutions for managing their networks.

New Apple iPhone 3G S will kill the Cisco Flip video camera
Before Cisco CTO Padmasree Warrior was hired by Cisco, she was the CTO of Motorola and dismissed in her blog the introduction of the Apple iPhone. However within 9 months of the Apple iPhone introduction, Motorola sales had collapsed by more than $4 billion.

DRAM's inventor, 76, still going strong at IBM
Dennard's Law? It doesn't have quite the ring of Moore's Law, mostly because IBM researcher Robert H. Dennard remains unknown to the general public. But the research community knows the name behind DRAM.

Thomas Jefferson would be awful at Twitter
Keith and guest co-host Matt Hamblen talk about Twitter's role in Iranian unrest, whether the Palm Pre can disguise itself as an iPod, and why most of us are still behaving badly with our cell phones. (50:49)

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


VMware's vSphere reviewed
vSphereWe found 5 things to love and 5 things to hate about VMware's vSphere.

Take the quiz
IT quizAre you a net know-it-all? Prove it.

Protecting Server Virtualization Environments
Date: June 25, 2009 Time: 2:00 p.m. EST/ 11:00 a.m. PST Deni Connor, principal analyst for Storage Strategies NOW, will host a live chat on Protecting Server Virtualization Environments. Based on a study from VMware, disaster recovery and business continuity is the foremost reason for deploying server virtualization.
Register Now


 

June 19, 2009

TOP STORIES | MOST DUGG STORIES

  1. Want a city job? Fork over your usernames, passwords
  2. Google grabs 1 million phone numbers for Google Voice
  3. Microsoft backtracks, extends XP availability to 2011
  4. Why is the PC vs. Mac war still raging?
  5. Nine Ball attack strikes 40,000 Web sites
  6. What is a router?
  7. IPhone 3.0 update: 10 hidden features
  8. Weighing the pros/cons of desktop virtualization
  9. New Apple iPhone 3G S will kill the Cisco flip video camera
  10. IPhone 3.0 Software: What you'll see

Email Security – Enforcing Corporate Policy in the Cloud
For IT departments to guard their organization's email, they have historically introduced a sprawling array of isolated point systems resulting in a fractured environment with multiple points of failure and fragmented administration. This Webinar will expose the myths of moving email security to the cloud, why this choice can save you time and resources, and what to look for from a cloud vendor.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

 

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: