Thursday, February 23, 2012

Size matters: A guide to tablets, great and small

  Carrier Ethernet 2 aims for global connectivity | Windows 8 logo hacked to Chinese Web site
 
  Network World Daily News PM

Forward this to a Friend >>>


Size matters: A guide to tablets, great and small
From the teensy Galaxy Note to the Motorola Xoom, tablet computers come in all sizes Read More


WEBCAST: Compuware

Why Server Virtualization Demands and End-user's Perspective
Join Compuware and featured guest Forrester Research, Inc. in this webcast to understand Forrester's definition of the user experience network or UxN and why dynamic virtualized environments demand end user monitoring. Register now.

In this Issue


WEBCAST: Infoblox

The CIO's View: Time-to-Value Through Automation
An IDG Research survey found that CIOs are eager to invest in technologies that will enable them to get new applications and services up quickly, achieving faster time-to-value. In this Webcast, you will learn how Benny Kirsh, CIO of Infoblox, is leveraging IT automation to gain faster time-to-value. View Now

Carrier Ethernet 2 aims for global connectivity
The Metro Ethernet Forum has updated its Carrier Ethernet specification, hoping to standardize the use of Ethernet for global multicarrier services. Read More

Windows 8 logo hacked to Chinese Web site
An image of the Windows 8 logo leaked last week was hacked from the design studio's network and posted to a Chinese Web site, according to a published report. Read More

T-Mobile getting LTE at last
T-Mobile has at last unveiled its plans for deploying LTE, as the company today said it will invest $4 billion to have LTE services available sometime in 2013. Read More

White House pushes for new privacy codes of conduct
The U.S. White House will push for online businesses to adopt new privacy codes of conduct, including consumer rights to control what information websites collect about them and a right to see what data is being collected, officials there said. Read More

Sony copyright blowin' in the wind: Jobs video on, off, on, off
Yesterday morning we brought you the tale of a copyright takedown by Sony Music Entertainment against a 5-minute tribute film produced in 1985 by Apple employees to celebrate the 30th birthday of Steve Jobs. The video, which features the Bob Dylan classic "My Back Pages," had received its first widespread public attention right after Jobs died Oct. 5 and Technologizer editor Harry McCracken posted... Read More


WHITE PAPER: Array Networks

Large-Scale Remote Access & Mobility
Today, secure remote access must support the increased demands of productivity, mobility and business continuity. Learn why traditional VPNs are not up to the task and why remote desktop access is superior for cost-effectively achieving enterprise-wide remote access and mobility. Read now.

Curvaceous iPhone 5 concept emerges
It's been a little more than a year since we compiled as many iPhone 5 concept designs as we could find on the web and delivered them in a nice tidy iPhoneys slideshow for you. And of late, more of the buzz has been about a potential iPad 3, possibly being announced in early March (See: "Hottest iPad 3 design concepts"). Read More

Survey finds Android users more likely to be app freeloaders
While everybody loves getting things for free, it seems Android users love getting free things more than anyone. Read More

Is smaller better for iPad size? Two gadget repair gurus weigh in
Apple's iPad may be the most successful tablet in the world, but few manufacturers seem willing to copy it from a size perspective. Read More

Whitman gives HP harsh report card, outlines recovery plan
Hewlett-Packard has underinvested in its business and become "too complex and too slow," President and CEO Meg Whitman said Wednesday, offering a three-part turnaround plan to get the ailing company back on track. Read More

Microsoft Extends Windows 7, Vista Support to 10 Years
It looks like Microsoft has finally learned that old operating systems don't die quickly.Perhaps in an acknowledgement of reality, Microsoft has quietly extended the consumer support for its two most recent operating systems, Windows 7 and Vista, from the usual seven years to 10 years. Read More


WEBCAST: VMware

Automating Infrastructure and Operations Management
Attend this webcast to learn how the new VMware vCenter™ Operations Management Suite allows IT to: - Dramatically simplify services - Automate service delivery and management View Now!

Amazon cloud service automates business processes
Amazon's newest offering, announced Wednesday, is designed to ease application development and automate business processes. Read More

LG launches Optimus 4X HD with quad-core processor
LG Electronics has launched the Optimus 4X HD smartphone, which is powered by a quad-core processor from Nvidia and runs Android 4.0, the company said on Thursday. Read More

Zettaset to offer role-based access control for Hadoop
Zettaset, which makes tools for managing big data, has unveiled its SHadoop security initiative to help companies better control access to data in Hadoop. Read More

Google's smart glasses reportedly coming in 2012
The New York Times reported Wednesday that Google's new Android-based goggles will be priced between $250 and $600, and include a 3G or 4G data connection along with motion and GPS sensors. Read More

Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking
As many as 200,000 systems connected to the Internet could be hijacked by hackers exploiting bugs in Symantec's pcAnywhere, including up to 5,000 point-of-sale programs that collect credit card data, a researcher said today. Read More

How to Save the IT Industry in 4 (Not So Easy) Steps
Offshore outsourcing is again a hot topic this election year, but the solutions U.S. politicians are proposing will do little to prop up the American IT services industry. If government leaders really want to save U.S. IT jobs, here's what they should do. Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 21
  2. Apple's 30th birthday salute to Steve Jobs knocked off YouTube
  3. Cisco: Customers drove us to block Microsoft/Skype
  4. OK Cisco, we get it
  5. Extreme ships 192-port 40G Ethernet switch
  6. Air Force abruptly scraps iPad plan for special ops
  7. FCC chairman calls on ISPs to adopt new security measures
  8. Ubuntu Android add-on designed to replace PCs
  9. Battle of the cheap tablets: Nook Tablet vs. Kindle Fire
  10. The Windows 8 quiz
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment