Search This Blog

Friday, January 21, 2011

Ballmer to Hu: 90% of Microsoft customers in China using pirated software

15 Best iPhone Apps for Newbies | Google fires back about search engine spam

Network World Daily News PM

Forward this to a Friend >>>


Ballmer to Hu: 90% of Microsoft customers in China using pirated software
While Chinese President Hu Jintao knew he'd face some tough questions when he came to the United States this week, he probably figured most of them would come from Barack Obama and members of Congress. But you can add Microsoft CEO Steve Ballmer to that list. Read More


WHITE PAPER: Riverbed

5 Key Principles to Redesign IT Infrastructure
Wide Area Data Services can bring the distributed enterprise closer together. Read this paper to learn the 5 key principles you can leverage to redesign an environment of any size and provide better support for distributed employees and improved business continuity during a disaster. Read now!

WHITE PAPER: Emerson Network Power

A Framework to Visualize the Data Center
Increasing rack density makes it critical to understand environmental characteristics around weight, heating, cooling and power. Flat-file data center planning and management tools can't Read Now

15 Best iPhone Apps for Newbies
For years, many have longed to own an iPhone, only to be turned off by AT&T's dodgy network. The wait is over: A Verizon iPhone 4 will hit the market Feb. 10. So what will you download first? Here are 15 can't-miss iPhone apps. Read More

Google fires back about search engine spam
The Google folks are taking issue over spam and the quality of Google searches which some have claimed has gone down in recent months.  Read More

Three more Microsoft executives jump ship
Three more Microsoft executives left the company this week just days after CEO Steve Ballmer decided to replace Bob Muglia at the top of the Server and Tools Business. Read More


WHITE PAPER: Aerohive

A Practical approach to Wireless 2.0
Creating "Wi-Fi that works" is a tall order given the breadth of client and application types, the speed and complexity of 802.11n, high-density environments, etc., controller-based vendors cannot live up to their promises of Ethernet-like determinism. Read now!

Juniper raiding Cisco and Microsoft executive ranks
Juniper is poaching two familiar territories as it stocks up on marketing executives: Cisco and Microsoft. These moves are key for Juniper as it looks to emulate the channel success of Cisco and Microsoft, and build out its stable of third party software developers. Read More

This changes nothing: A Schmidt is still a Schmidt
A few days before Thanksgiving, I used this space to put forward the long-held (in my mind) notion that Eric Schmidt, when he left Novell to take the top spot at Google in 2001, committed the single greatest career move in the history of career moves. As a consequence, I argued, any great career move on the part of anyone should be known as "a Schmidt." Read More

Did Google push Schmidt aside over Facebook challenge?
Why, with Google going gangbusters, would company leaders decide Eric Schmidt needs to step aside as chief executive? One analyst's speculation: To better position to take on Facebook. Read More


WHITE PAPER: Extreme Networks

Four Pillar Strategy for Next Generation Data Centers
Enterprises today are migrating from a purely physical infrastructure to a highly efficient virtualized infrastructure and potentially to a fully enabled cloud environment. This migration promises to greatly enhance the efficiency and scalability of data center operations. Read now!

FBI warns of Trojan-tainted resumes, other phishing scams
New phishing scams have become so alarming, they've sparked warnings from government agencies including the FBI and Department of Defense. The scams involve claims of Patriot Act violations, WikiLeaks threats, and faked resumes. Read More

After Groupon bid, Google pursues coupon service
Google confirmed Friday that is working with small businesses on a trial of a prepaid offer or voucher program, a business similar to that of Groupon, a growing company which the Internet giant tried to acquire last year. Read More

Cisco report notes new cybercrime targets
Cybercriminals are shifting their focus to smartphones and tablets, and away from Windows-based PCs, as targets for their scams, according to a new security report from Cisco released this week. Read More

Twitter targeted with fake antivirus software scam
Twitter has been resetting passwords for accounts that started distributing links promoting fake antivirus software in an attack that used Google's Web address shortening service to conceal the links' destination. Read More

Google copied Java in Android, expert says
An intellectual property expert has uncovered 43 instances where it appears that Google copied Java code without permission in the most recent versions of the Android operating system. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. The case of Apple's mystery screw
  2. Is Apple expanding use of tamper-resistant screw for iPhone?
  3. Gartner slams Cisco's single-vendor network vision
  4. 12 geekiest snow and ice sculptures
  5. Yahoo IPv6 upgrade could shut out 1 million Internet users
  6. Fake GSM base station trick targets iPhones
  7. Google's management shakeup: The day after
  8. Gamers hijacked your server? Might be an inside job
  9. Cause of Windows Phone 7 data spikes found
  10. Is retaliation the answer to cyber attacks?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: