Search This Blog

Thursday, June 11, 2009

Google's Outlook interface a weak nod to corporate reality; Nortel customers upbeat, anxious; 8 great iPhone alternatives

Nortel customers upbeat but anxious; Forget iPhone 3G S: Eight Great New iPhone Alternatives
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Citrix Systems
rule

Yankee Group: The Roadmap for Load Balancing
Most load balancing solutions were not built for today's IT infrastructure. Their focus on traffic management and outdated polling techniques does not solve application delivery problems. Attend this Webcast to hear Yankee Group's roadmap for load balancing, analysis on industry trends in the data center and recommendations for faster application delivery.

rule

Spotlight Story
Google's Outlook interface a weak nod to corporate reality

While Google is in hot pursuit of an enterprise e-mail business, the announced support this week for Outlook as a client interface for Gmail does little to distinguish the vendor from other players chasing top-dog Microsoft. Read full story

Related News:

News podcast: Network World 360
The recession has caused growing numbers of IT shops to seek loans and lease agreements as a way to get through their budgets, a new report says. Also, Officials of Nortel's largest enterprise user group said this week that customers are remaining optimistic despite the company's precarious situation. (6:08)

Nortel customers upbeat but anxious
Nortel customers remain optimistic despite the company's precarious situation, officials of Nortel's largest enterprise user group said this week.

Forget iPhone 3G S: Eight Great New iPhone Alternatives
Apple unveiled its latest smartphone offerings this week, in the form of two new devices: the 16GB and 32GB iPhone 3G S. That's all fine and good for Apple fanatics; you can have your spiffed up iPhones. Here are eight more devices we like just as much - or more - than Cupertino's new mobile wares.

The Internet is incomplete, says its co-designer, Vinton Cerf
Vinton Cerf, the co-designer of the Internet's basic architecture, said the Internet "still lacks many of the features that it needs," particularly in security, in a blunt talk to a tech industry crowd.

Angry iPhone owners blast AT&T over upgrade pricing
iPhone users angry over AT&T's pricing policy for the new iPhone 3G S have taken their campaign to Twitter, where more than 4,400 have added their names to an instant petition.

Upgraded BlueCat IP address management appliance could ease IPv6 adoption
BlueCat Networks will announce on Thursday a new version of its IP address management appliance with enhancements designed to reduce the time it takes to manage IP address space. That's an issue growing in importance as network operators adopt IPv6, an upgrade to the Internet's main communications protocol.

No Microsoft OCS For SMBs?
There's no doubt about it: Microsoft's OCS solution is growing popularity and curiosity in the industry quickly. With all of the attention focused around the medium and large enterprises, many in the smaller organizations wonder: Will there be an OCS for the SMB?

The shadow network architecture
We live in an age when the networks we have created give us so much access and so much power. Naturally, there are those who have taken that beautiful thing and twisted it for their own evil ends.

Get to the root of a performance problem with scorecards
Performance management marries business intelligence and financial data, among other disciplines, then ties it together with business goals.

Apple iPhone vs. Palm Pre: No Contest
Monday's iPhone 3G S announcement was a bit of an anticlimax, and certainly contained no surprises. I mean, a compass app getting top billing? Even the $99 entry-level model was expected.

Google Antitrust Case Misses the Point
The issue with whether Google is or is not a monopoly isn't merely its search dominance: It's Google's ability to control online advertising and, increasingly, what we read or don't read.

Saving Unix one kernel at a time
In this its 40th year of operating system life, some Unix stalwarts are trying to resurrect its past. That is they are taking on the unenviable and difficult job of restoring to its former glory old Unix software artifacts such as early Unix kernels, compilers and other important historical source code pieces.

It's a Vase! It's a PC! It's both!
Built as a concept design by Taiwan's Elitegroup Computer Systems, a contract PC maker, inside the plastic vase is a home media computer complete with a Blu-ray Disc player offering full 1080p high-def playback.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


Windows 7 + Windows Server 2008
Windows 7We found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Management appsHere are nine management apps that won't break the bank.

How to better manage your network
You're under pressure to constantly improve service quality, efficiency and customer experience while simultaneously reducing costs. Download this whitepaper today and discover the 4 keys to making that seemingly impossible task happen by improving operational efficiencies.
Read Now


 

June 11, 2009

TOP STORIES | MOST DUGG STORIES

  1. Google unveils plug-in to marry Outlook, Gmail
  2. 2009 top urban legends in IT security
  3. T-Mobile: Stolen network data genuine, but fear not
  4. World's most outrageous PC cases
  5. Fedora 11 released with new virtualization, software mgmt. tools
  6. New DoS attacks threaten wireless data networks
  7. T-Mobile net reportedly hit by hacker/extortion attack
  8. 10 things you didn't know about cyberwarfare
  9. Juniper claims first with 100G Ethernet
  10. Cisco losing share across the board: analyst

How to Get Ahead of Web App Security Threats
If you rely on Web applications to support any part of your business, it's time to take control of your application security. Download this whitepaper today and discover how to examine your existing security practices and get the recommendations you need to protect your enterprise from a breach.
Read Now



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: