Search This Blog

Friday, March 23, 2012

Apple's Bonjour protocol tamed, managed for enterprise Wi-Fi

15 best Windows 8 apps to get you started | Windows 8 roundup: Dell's bid, taking on iPad, October target

Network World Daily News AM

Forward this to a Friend >>>


Apple's Bonjour protocol tamed, managed for enterprise Wi-Fi
How can iPads and iPhones discover and use projectors, Apple TVs, printers and the like without flooding the enterprise Wi-Fi network with multicast discovery messages? Aruba Networks says it has a way. Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WHITE PAPER: IBM

The Future of Software Delivery is Cloudy
Cloud technology is a terrific platform for a vast array of workloads. But what about cloud computing can actually help you transform your business? Read this ebook to learn the real-world potential benefits of using the cloud as a platform for more effective software delivery. Read Now

15 best Windows 8 apps to get you started
Read More

Windows 8 roundup: Dell's bid, taking on iPad, October target
Dell thinks it can make a buck off Windows 8 tablets, despite the fact that it pretty much abandoned its Android tablets last year. Read More

Cisco losing router sales to HP?
Thanks to a Chinese market that grew 34%, HP more than doubled its enterprise router market share in 2011, according to Infonetics Research. China drove just about the entire enterprise router market in 2011 -- worldwide it grew only 2% from 2010, to $3.5 billion. HP acquired a significant presence and product line in China with the 2009 acquisition of 3Com. Read More


WHITE PAPER: Antenna

Mobile strategy—what are 1,000 businesses planning for 2012
The Mobile Business Forecast 2012 surveyed 1,000 global businesses on their current/future plans for mobile. The report offers insight into how companies are using mobile to address the needs of consumers and their own employees. In addition, find tips on how to avoid chaos in the rush to mobilize. Learn More

Why Hackers Set Their Sights on Small Businesses
If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then? Read More

A rare look inside Ancestry.com headquarters
At Ancestry.com headquarters in Provo, Utah, workers scan microfilm and city directories and carefully take photos of historical documents, all to be uploaded to the website. Read More

US ISPs commit to new cybersecurity measures
A group of U.S. Internet service providers, including the four largest, have committed to taking new steps to combat three major cybersecurity threats, based on recommendations from a U.S. Federal Communications Commission advisory committee. Read More


WHITE PAPER: Oracle

Migrating Your Legacy IBM Database Environment
Download this guide to ensure a seamless migration and take advantage of reduced costs associated with extremely efficient day-to-day database administration. Learn More!

Texas Ousts IBM, Takes New IT Outsourcing Tack
Second-generation IT services deals almost always go better. But after an especially troubled relationship with IBM, Texas is counting on new vendors and an unproven outsourcing model to deliver the second time around. Read More

Google patents technology to serve ads based on background noise
A new Google patent could enable the search giant to base advertising on background noise during phone conversations, although the scope of the patent is much broader. Read More

Facebook reportedly buys IBM patents
Facebook has reportedly acquired patents from IBM, a move that could help it shore up defenses against new patent infringement lawsuits ahead of its IPO. Read More

Building a Great Place to Work
What are you really working for? CIO.com columnist Rob Enderle discusses how successful companies build rewarding workplaces, engender employee loyalty and create great products. Spoiler alert: sky-high CEO bonuses aren't part of the recipe. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Sexist gaffe costs startup event sponsors
  2. Cisco's big comeback
  3. 7 steps for thwarting hactivists
  4. Chrome's trumping of IE could herald things to come
  5. Researchers find new type of 'fileless' malware
  6. Cisco helps users welcome BYOD
  7. Five very cool (but kinda creepy) mobile technologies
  8. Yes, Microsoft wants Windows 8 to compete with iPads
  9. iFixit dismantles the new iPad
  10. LulzSec is back; Anonymous targets Imperva

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: