Search This Blog

Friday, January 06, 2012

20 Most Anticipated Tech Products of 2012

  Symantec confirms source code leak in two enterprise security products | Microsoft aims Windows 8 storage at enterprise data centers
 
  Network World Daily News PM

Forward this to a Friend >>>


20 Most Anticipated Tech Products of 2012
From Apple's iPhone 5 to next-gen thermostats to OLED TVs, here are 20 tech products we're looking forward to seeing in 2012. Read More


RESOURCE COMPLIMENTS OF: CW Honors

Accepting Nominations: Computerworld Honors Laureate Program
For 23 years, the Computerworld Honors Program has honored the world's foremost organizations, institutions, men and women, and recognized their visionary applications of information technology to promote positive social, economic and educational change. Learn more.

WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Symantec confirms source code leak in two enterprise security products
Symantec late Thursday confirmed that source code used in two of its older enterprise security products was publicly exposed by hackers this week. Read More

Microsoft aims Windows 8 storage at enterprise data centers
Windows 8 includes a storage scheme suitable for business deployment that can treat hundreds of disks as a single logical storage reservoir and ensures resiliency by backing up data on at least two physical disks. Read More

CES 2012 ultrabooks and tablets
HP, Acer, LG, Lenovo among vendors touting flashy new wares at CES 2012 Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Six CES 2012 stories to watch
The six things we'll be following most closely at this year's Consumer Electronics Show. Read More

Developers top IT hiring managers' wish lists
Hiring developers is the top priority for today's IT staffing pros, according to Dice.com. The IT jobs site polled 1,200 tech-focused hiring managers and recruiters, and Java developers ranked first among 10 staffing priorities for 2012. HELP WANTED: 7 hot jobs for 2012 Read More

7 Signs You've Outsourced Too Much to IT Service Providers
Have you outsourced too many IT services? Once an organization gets a taste of the benefits of IT outsourcing, the hunger for more naturally increases. But the ROI quickly diminishes as internal IT service organization shrink. If these seven traits apply to your company, you've outsourced too much. Read More


WHITE PAPER: HP

Effectively Virtualizing Tier-1 Application Workloads
This ESG Report presents test results of the performance and scalability of the HP ProLiant DL980 server, and how it can be used to lower costs, increase scalability, and provide high performance while maintaining the reliability and availability required by tier-1 applications. Learn more

A milestone for xkcd: 1,000 comics
I was speaking yesterday to a teacher whose British accent is pronounced when he mentioned Monty Python in passing. "Who doesn't like Monty Python," I said. And his sour expression reminded me that not everyone does, not even every Brit. So it is with Randall Munroe's Web comic, xkcd: I know there are people who don't like it, but it's a mystery to me as to why. I'm a big fan, so it is with pleasure... Read More

Smartphone/stun gun ranks as one of TSA's top finds for 2011
Apple, HTC, Samsung, RIM and other smartphone makers are really outdoing themselves these days cranking out new must-have smartphones. But to our knowledge, none of them have yet gotten to the point where they've intentionally started to sell combination smartphones/weapons. Read More

Consumerization creates IT management blind spots, increases business risk: survey
As end users bring their own devices to work, download apps and sign up for cloud services, it's getting harder for IT to maintain application visibility and control performance. Trends such as consumerization, mobility and cloud computing are also increasing business risk, CIOs say. Read More

Fedora, Mint, openSUSE, Ubuntu: Which Linux desktop is for you?
There are more interesting Linux desktop distributions to choose from than ever before. However, if you're looking for major distros with a great deal of support, you'll want to look at the big four: Fedora, Mint, openSUSE, and Ubuntu. Read More

Avaya: Top 10 pitfalls with UC implementations
Webtorials and Avaya have once again provided a great reference for those considering a unified communications (UC) deployment. The white paper, titled "Why UC Implementations Fail," reviews the top 10 pitfalls that organizations should consider when as they move through the UC implementation process. Read More

 
 
 

SLIDESHOWS

10 essential data center appliances
With all of the noise in data center networking focused on switches, fabrics and lossless Ethernet standards, appliances like WAN optimizers and application accelerators are often overlooked. But they are important components of the data center/cloud infrastructure, especially as organizations virtualize desktop applications for remote sites. Here's a listing of 10 of the top players, and their products, in data center appliances.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 3
  2. Who's lying? The iPad owner or the border guard?
  3. Microsoft patch blows 'perfect game' but sends important message
  4. 9 hot technology startups to watch in 2012
  5. Cisco dumps the UMI personal telepresence very quietly
  6. iPhone 5 rumor rollup for the week ending Dec. 31
  7. Software whiz Ray Ozzie re-emerges with startup Cocomo
  8. 2 days for amateur hacker to hack smart meter, fake readings
  9. IT pros lament: Low pay, no perks
  10. Facebook Timeline scams prey on wishful thinking
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: