Monday, March 05, 2012

Warning: you may be an e-hoarder

  Top tech M&A deals of 2012 -- so far | Siemens launches new VoIP/UC platform, says it has earned another look
 
  Network World Daily News AM

Forward this to a Friend >>>


Warning: you may be an e-hoarder
Hoarding shows are popular these days. Hoarders, Hoarding: Buried Alive, Confessions: Animal Hoarding and on and on. The images are consistent: Boxes stacked to the ceilings. Piles of newspapers dating back to the Nixon era. Feral cats skittering behind furniture. Empty cans of cat food, beans and soup scattered everywhere. Read More


WHITE PAPER: Quest Software

Want to Make Compliance Easy? Get Proactive!
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity. Get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs today and tomorrow. Read Now!

RESOURCE COMPLIMENTS OF: Ciena

Don't Miss: THE BANDWIDTH ULTIMATUM.
Be the FIRST to hear about Ciena's BLOCKBUSTER, game-changing optical innovation of the decade. THINK BIGGER, SMARTER NETWORKS. Ones that are programmable, flexible, and scalable – and change the way you compete. Unrated. Uncut. Unbelievable. GO NOW.

Top tech M&A deals of 2012 -- so far
Cisco, IBM, Juniper & more. A summary of who did the buying, who got bought, how much they went for and why. We'll be updating as more deals are made. Read More

Siemens launches new VoIP/UC platform, says it has earned another look
Siemens Enterprise Communications, which has been rebuilding itself here in the U.S. for the past several years, will punctuate the idea that it deserves another look with the announcement Monday of Version 7.0 of its OpenScape UC suite that enables the VoIP platform to support up to 500,000 users. Read More

iPad 3 pricing to remain the same as the iPad 2 - Report
With the iPad 3 unveiling just days away and on target for March 7, a rumor surfaced last week - originating from a Chinese microblogging site - claiming that the iPad 3 was going to be $80 more expensive than the iPad 2. For a company that likes to keep things, and especially prices, consistent, this struck many as odd. Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
How "mobile ready" is your infrastructure? This Mobility Knowledge Vault provides a wide variety of expert advice on how to strike a balance between end user ease-of-use and security. View now

Investment firm warns of delays, performance issues in Juniper products
Is Juniper experiencing longer product delays and performance issues than the company has disclosed? Read More

FourSquare drops Google Maps API for OpenStreetMap
Location-based social media service FourSquare this week abruptly swapped the Google Maps technology underlying its product for the OpenStreetMap, announcing a new partnership with startup MapBox. Read More

How Passpoint could make Wi-Fi hotspots more like cellular data services
Imagine if Wi-Fi worked more like our mobile data services that gave us wireless connectivity without the constant interruptions that come from switching hotspots and that gave us a deeper level of security than anything we get when we connect to public hotspots. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

TECH DEBATE -- The future of end user computing: Two visions
Personal computing as we know it is changing as hordes of workers arrive with their favorite new tech tools and demand access to corporate resources. We ask two companies likely to play key roles in the flexible new world of end user computing – VMware and Citrix -- to spell out the future as they see it. Who do you think is better positioned to deliver on the promise? Cast your vote. Read More

Anonymous supporters find themselves victims of Zeus Trojan Horse
The hacktivist group Anonymous has taken on an increasingly more public profile over the past few months as the list of websites they've been able to infiltrate and deface is long and far ranging. From the US DOJ to the UFC website, Anonymous has proven quite adept at breaking into whatever they set their eyes on. But recently, members of the group had the tables turned around on them when many found... Read More

IT's 6-step guide to adopting consumerization
Most businesses are accepting, even embracing, consumer technology. What do they know that you don't? Read More

Should You Allow Inbound E-mail Over IPv6?
Federal organizations are aiming for September 2012 mandate to IPv6-enable their Internet perimeter applications. This not only includes IPv6-enabling web servers, but also IPv6-enabling e-mail servers. Therefore e-mail servers would be allowing inbound SMTP (TCP port 25) connections over IPv4 and IPv6. However, most e-mail content filtering companies only have defensive capabilities for IPv4. ... Read More

How the Cloud Cuts VC Dependencies and Democratizes Entrepreneurship
A decade ago, investors funded projects. Today, venture capital funds scaling up already successful companies. This shift isn't just because VCs have become more rational in their investments. Plenty of startups just don't go looking for cash. The main reason startups can postpone or turn down VC money is cloud computing and SaaS. How the Cloud Cuts VC Dependencies and Democratizes Entrepreneurship Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Destroy digital evidence before it destroys you
  2. Top 25 iPhone & iPad apps for business
  3. How to catch an Internet cyber thief
  4. Hands-on with Windows Server 8 beta
  5. Windows 8 review: 'Mission accomplished', 'transcendent', 'unintuitive'
  6. How to protect your online privacy
  7. Windows 8: What you need to get started
  8. AT&T ups "unlimited" 3G throttling cap to 3GB
  9. Juniper targeting 7 key market segments
  10. Mozilla's 'modest proposal': Dump the smartphone OS
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment