Search This Blog

Monday, March 14, 2011

iPad 2: Don’t take it apart, or risk cracked glass

Microsoft apologizes for using Japan disaster to market Bing | 5 signs that your techies are being poached

Network World Daily News AM

Forward this to a Friend >>>


iPad 2: Don't take it apart, or risk cracked glass
Apple's iPad 2 tablet, which became available Friday, boasts a big battery, tiny speakers, an ample 512MB of RAM and a glass front that's tricky for tinkerers to take off. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WHITE PAPER: CA

Forrester: The Emergence of Service Assurance
Forrester interviewed more than 150 IT professionals to understand the fundamental issues around managing the performance of business application and business services and their underlying transactions. Read their key findings and expert recommendations. Read Now

Microsoft apologizes for using Japan disaster to market Bing
The first rule of using social networking as a marketing tool should be: Know when to do it and when not to do it. The aftermath of an unfathomable natural disaster should be Example No. 1 of when not to do it. Read More

5 signs that your techies are being poached
With IT hiring on the rise, CIOs need to worry about an issue that hasn't cropped up in years: how to prevent their most talented employees from being poached by rivals. Read More

Power and transport trouble Japanese IT makers after quake
Japan's major electronics companies took stock of their problems on Monday, as the country struggles to come to terms with the scale of devastation following Friday's massive earthquake and tsunami. Read More

Japan's phone networks remain severely disrupted
More than a day after a massive earthquake and subsequent tidal wave slammed Japan, the country's telecommunications services remain severely disrupted. Read More


WHITE PAPER: BMC

SMART, Modular, Cost-Effective Steps to Workload Automation
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business. Learn More Now!

Japan's Internet largely intact after earthquake, tsunami
Japan's Internet infrastructure has remained surprisingly unaffected by last week's devastating earthquake and tsunami, according to Internet monitoring firm Renesys. Read More

Happy Pi Day: Many more than 3.14... pictures of cool Pi creations
March 14 is Pi Day (3.14, get it?), and to celebrate the magical and mesmerizing mathematical constant, I've collected a dozen very special Pi tributes from around the Web (here's a brief history of Pi, to boot). Read More

Should Cisco Sell?
Should Cisco sell off some operations after setting the standard for years in acquiring and successfully assimilating companies into its enterprise? That's the question Reuters asked in a recent article reviewing the company's financial challenges of late. Read More

Tech We Took From Science Fiction
Even though we're still waiting for flying cars, we're already living in the future predicted by science fiction. Here are a few tech prophecies from sci-fi films, books, and TV shows that became reality. Read More


WEBCAST: CA

Fast-track Your Success with Private Clouds
In this webcast you will learn how to kick-start private cloud initiatives while addressing today's concerns: getting applications to market quickly while handling the requirements around performance and scalability, uncompromised security, application portability and interoperability with public clouds. Learn More

New attacks leverage unpatched IE flaw, Microsoft warns
An Internet Explorer flaw made public by a Google security researcher two months ago is now being used in online attacks. Read More

The cloud's Achilles' Heel is that it's uninsurable
While companies like Microsoft were touting the growth and benefits of cloud computing at the recent Cloud Connect conference here in Silicon Valley, one speaker gave what he called his "wet blanket" presentation warning of a big hole in the cloud business model. Read More

Microsoft puts hand on Office XP plug, ready to pull
Microsoft today reminded customers that it will pull the support plug for the aged Office XP in July. Read More

Bing-powered searches rise as Google loses share
Microsoft's Bing search engine is on the rise, while Google's still-dominant market share has dropped to about two-thirds of all U.S. searches. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Researchers develop more powerful biofuel alternative
  2. Google still scrambling to recover from DroidDream Android attack
  3. Ex-Microsoft CTO publishes groundbreaking cookbook
  4. If you had bought 100 shares of Microsoft 25 years ago ...
  5. Harvard computer scientist Leslie Valiant wins Turing Award
  6. The eight most important commands on Cisco ASA security appliance
  7. VMware unleashes virtual desktops for Apple iPad
  8. Microsoft pushes more Kinect-like user interfaces
  9. Botnets, cloud computing power may be fueling attacks against VoIP
  10. Most Android, iPhone apps violate open source rules

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: