Search This Blog

Tuesday, June 07, 2011

4G faceoff: ThunderBolt vs. Galaxy

How to protect smartphones and tablets | Will cloud computing make traditional vendor relationships obsolete?

Network World Product Test

Forward this to a Friend >>>


4G faceoff: ThunderBolt vs. Galaxy
With 4G smartphones hitting the market in a big way, we decided to test a couple of devices to get an overall sense of how 4G compares with 3G, how specific devices perform and how the underlying networks differ. Read More


WHITE PAPER: Aerohive

A Practical approach to Wireless 2.0
Creating "Wi-Fi that works" is a tall order given the breadth of client and application types, the speed and complexity of 802.11n, high-density environments, etc., controller-based vendors cannot live up to their promises of Ethernet-like determinism. Read now!

WHITE PAPER: Quest Software

Transaction Tracing through Complex Web Applications
In this Quest white paper, learn about the components of a transaction as they cross various application domains. Then, discover the difficulty in connecting transaction components for monitoring, why continuously monitoring is key and how a third-party solution simplifies the challenge. Learn more.

How to protect smartphones and tablets
Managing mobile devices entails a level of complexity unheard of in the traditional enterprise world of Windows desktops. MDM software needs to control devices from multiple manufacturers, running different versions of as many as five operating systems, tied to carrier networks with their own particular constraints. Read More


WHITE PAPER: Avaya

Avaya Virtual Services Platform 9000
A high performance modular routing switch for core deployments. Core network infrastructure needs to be able to handle increased load without packet loss, while providing quick recovery times in case of a component failure. Learn More

Will cloud computing make traditional vendor relationships obsolete?
Network World has conducted multiple tests of cloud-based services over the past year, and our overarching conclusion is that shifting compute processes to the cloud can help companies save money and become more flexible. Read More


WHITE PAPER: Avaya

Video Collaboration: Lights, Camera, User Adoption
Video deployment has been slow. Today, barriers are dissolving. Price points are dropping. CIOs are more engaged in driving the business forward with process and technology. Learn More

Check Point's new security blades cut both ways
If you're in the market for endpoint protection, Check Point's new R80 Unified Endpoint Security Management product shows promise. Read More

PlayBook plays in WiFi world
Research in Motion's PlayBook tablet is primarily intended to connect with a BlackBerry handheld device via Bluetooth in order to present an enhanced display of the BlackBerry's e-mail, contacts list, calendar and other items. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Police: Man stole nude photos from hacked email accounts
  2. 8 hot features in Windows 8
  3. The 20 best gadgets of 2011 -- so far
  4. Why there's no Nobel Prize in Computing
  5. iPhone 5 rumor rundown for week ending June 3
  6. Cisco resorting to intimidation tactics
  7. First look at Windows 8
  8. RSA's INsecurID
  9. Ex-Cisco consumer chief Flips for grilled cheese
  10. Large-scale IPv6 trial set for June 8

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_product_test_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: