Thursday, March 01, 2012

Top 25 iPhone & iPad Apps for Business

  Windows 8 reviews: 'Mission accomplished', 'transcendent', 'unintuitive' | How to catch an Internet cyber thief
 
  Network World Daily News PM

Forward this to a Friend >>>


Top 25 iPhone & iPad Apps for Business
Apple's iPhone and iPad may have been built for consumers, but the folks in Cupertino correctly guessed that what's good for consumers is good for businesses. The only stumbling block may be the growing volume of apps available: more 140,000 natively for the iPad and over 500,000 that work on the iPhone and iPad. Here are 25 go-to iOS apps for business users, from travel planning to document editing using Microsoft Office tools to time tracking to getting a good night's sleep. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry Mobile Fusion
Now all personal and corporate-owned BlackBerry® smartphone and BlackBerry® PlayBook™ devices can seamlessly access business data and applications on a single, secure management platform. Soon, Apple® iOS and Google® Android™ devices will be able to do the same. Learn how this new approach will end mobile chaos at blackberry.com/mobilefusion

RESOURCE COMPLIMENTS OF: Ciena

Don't Miss: THE BANDWIDTH ULTIMATUM
Be the FIRST to hear about Ciena's BLOCKBUSTER, game-changing optical innovation of the decade. THINK BIGGER, SMARTER NETWORKS. Ones that are programmable, flexible, and scalable – and change the way you compete. Unrated. Uncut. Unbelievable. GO NOW.

Windows 8 reviews: 'Mission accomplished', 'transcendent', 'unintuitive'
Early reviews of Windows 8 range from describing it as speedy and elegant to unintuitive, but those who have given the operating system a test drive seem to enjoy the experience. Read More

How to catch an Internet cyber thief
They're out there, says security researchers: the Chinese hackers attempting to break into U.S. enterprises, and jihadist terrorists that brazenly post videos of sniper killings, while stealing credit-cards to launder money for funding nefarious campaigns in Mideast or Caucasus hot spots. Read More

AT&T's app developer billing scheme: Will app makers buy in?
AT&T's trial balloon of charging app developers for bandwidth their users consume might not stay in the air very long. Read More


WHITE PAPER: Internap

New eBook: Enterprise IP Buyer's Guide
We are all aware of the impact performance can have on the bottom line. Organizations are increasingly choosing Website Performance Optimization (WPO) technologies to boost reliability, availability and their bottom line. Learn More

Google Chrome share suffers with tweak of browser use calculation
A change in the way Net Applications calculates browser usage led to a slight decline in web browser market share for Google Chrome. Read More

TECH DEBATE -- The future of end user computing: Two visions
Personal computing as we know it is changing as hordes of workers arrive with their favorite new tech tools and demand access to corporate resources. We ask two companies likely to play key roles in the flexible new world of end user computing – VMware and Citrix -- to spell out the future as they see it. Who do you think is better positioned to deliver on the promise? Cast your vote. Read More

Stolen NASA laptop held Space Station control algorithms
The lack of key IT security protection is hurting NASA. According to a report issued by NASA Inspector General Paul Martin, security problems have gotten so bad that the March 2011 theft of an unencrypted NASA notebook computer resulted in the loss of the algorithms used to command and control the International Space Station. Read More


WEBCAST: VMware

Automating Infrastructure and Operations Management
Attend this webcast to learn how the new VMware vCenter™ Operations Management Suite allows IT to: - Dramatically simplify services - Automate service delivery and management View Now!

First iPad 3 drama? Short supply of Retina Displays reported
Apple hasn't even announced the iPad 3 yet, but tablet watchers are already fretting that the company might not have enough of them to meet early demand due to a short of the high-resolution Retina Display screens expected on the devices. Read More

Microsoft Azure stabilizes after leap year glitch
Microsoft's Azure cloud infrastructure and development service was apparently running nearly trouble-free on Thursday, following a series of outages on Wednesday that affected multiple aspects of the system. Read More

More than half of organizations take months or years to discover a breach, Verizon says
Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organizations discovered them months or years later, Verizon said in a report released at the RSA security conference on Wednesday. Read More

Microsoft releases Windows Server 8 beta
Closely following the company's public preview of Windows 8, Microsoft has released a beta version of its Windows Server 8 operating system. Read More

ATM PIN Numbers: Easier to Steal than You Think
Researchers find that a smart bad guy has a one-in-10 chance of guessing the PIN that guards your bank account. Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your online privacy
  2. Mozilla's 'modest proposal': Dump the smartphone OS
  3. Juniper targeting 7 key market segments
  4. iPad 3 concept video: How Apple could really blow us away
  5. Microsoft's Azure cloud suffers serious outage
  6. Microsoft unveils Windows 8 "Consumer Preview," downloads start
  7. NSA defines smartphone strategy: Think Android (maybe)
  8. Speedy 802.11ac Wi-Fi set for fast, wide rollout
  9. Alleged RSA crypto flaw hotly debated
  10. iPad 3 rumor rollup for the week ending Feb. 28
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment