Search This Blog

Friday, April 02, 2010

Will the iPad live up to the hype?

How Google wants to change telecom | Glam Gadgets: The Priciest Personal Tech in the World

Network World Daily News AM

Forward this to a Friend >>>


Will the iPad live up to the hype?
Apple has asked people to drop their netbooks and go with the "magical" iPad, which will be uncloaked in U.S. stores on Saturday morning. The excitement around the device is high, but will it live up to its hype? Read More


WHITE PAPER: Citrix Systems

Paravirtualization Case Study with Buyken Metal Products
When Buyken Metal Products considered re-architecting its datacenter for redundancy, it realized that its servers and other devices would need to be updated. The ability to virtualize Windows servers with paravirtualization led Buyken to Citrix XenServer, Enterprise Edition. Learn More Now

WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

How Google wants to change telecom
Google doesn't want to be your Internet service provider; rather, it wants to make your ISP behave in a more Google-friendly manner. Read More

Glam Gadgets: The Priciest Personal Tech in the World
Over-the-top luxury meets geeky gadgetry with glittery iPads, iPhones, iPods, laptops and more ¿ all with eye-popping price tags. Read More

Escalating attacks prompted emergency IE update, says Microsoft
Microsoft said that it patched the critical vulnerability in IE this week because the number of attacks jumped after news broke that the exploit had gone public. Read More


WHITE PAPER: IBM NWW

Understanding the Dynamics for Successful Delivery
Over the past decade, advances in software, hardware and networking technologies have enabled more and more technology to be woven into and around physical goods – adding value to those goods even without that technology necessarily being "embedded" in any hard-wired sense. Read More

Endpoint security gets complicated
Users say protecting network endpoints is becoming more difficult as the type of endpoint devices -- desktops, laptops, smartphones -- grows, making security a complex moving target. Read More

Cisco rival Juniper demos 100G Ethernet
Cisco rival Juniper last week demonstrated 100Gbps Ethernet interoperability with a handful of other vendors at the OFC/NFOEC optical networking conference in San Diego. Read More

What Does a Paying Open Source Customer Look Like?
So what does someone who pays to use open source software look like? The easy answer is they look a lot like you and I. But seriously, up until just a few years ago the idea of paying to use open source software would have been ludicrous. But as I wrote about yesterday, open source software use in the enterprise appears to be exploding. Read More


WHITE PAPER: PC Mall

Improving Disaster Recovery Solutions
Today, many companies have established a disaster recovery strategy but have not implemented a solution due to high cost estimations. This HP white paper examines how affordable data mirroring solutions can provide higher performance, high data integrity & faster and more cost-effective disaster recovery. Read More

Hotel chain starts using child porn detection
The prestige Radisson Blu hotel chain has become the first in the world to roll out a new technology that can spot guests receiving or distributing real images of child porn. Read More

AT&T wins first major deal at EPA
AT&T won a seven-year, $29 million contract to support the U.S. Environmental Protection Agency's nationwide network -- the carrier's first major deal with this federal agency, which has more than 17,000 employees in Washington, D.C., 10 regional offices and 27 laboratories. Read More

Sophos' April Fool's joke says romantic fiction a deterrent to hackers
Who says security vendors don't have a sense of humor? Sophos Inc. today urged companies to consider hiding sensitive data in snippets of romantic literature or other diversionary text to protect the data from hackers. Read More

Winners of the massive 50-book CCNP giveaways
The following 50 people won one copy of one of the following five titles in a contest generously sponsored by Cisco Press. If you see your name on the list but haven't seen your notification e-mail, check your spam filter. It is very hard to word my congratulations e-mails to distinguish them from contests of dubious origins. That e-mail will tell you which prize you won. Or you can wait and be surprised... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. 10 funny April Fools' pranks
  2. Google changes name to Topeka, introduces text-based videos
  3. Google cracks animal translation riddle ... for Android
  4. Silicon cockroaches, 'dirty' IPv4 addresses, other Internet oddities
  5. Tech secrets: 21 things 'They' don't want you to know
  6. Hurdles multiply for H-1B seekers
  7. Fozzie Bear discovers cloud computing
  8. Feel like you're being watched at work? You may be right
  9. The oddest places to find Linux
  10. 4G essentials

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: