Search This Blog

Tuesday, April 03, 2012

Microsoft counted as key Linux contributor, for now anyway

  Cisco, EMC, VMware unite behind big data, cloud training initiative | Cool old Ethernet paraphernalia
 
  Network World Daily News PM

Forward this to a Friend >>>


Microsoft counted as key Linux contributor, for now anyway
For the first time ever, and probably only temporarily, Microsoft can be counted as a key contributor to Linux. Read More


RESOURCE COMPLIMENTS OF: CDW

Leverage Unified Communications for Greater Productivity
Join CIO magazine, Computerworld, and Network World for an up-to-date look at today's social workplace, where you discover how real organizations are leveraging social capabilities such as presence, instant messaging, chat and video to improve secure employee communication, collaboration, productivity and - of critical importance - job satisfaction Learn more at: http://events.cio.com/UCSeminar

WEBCAST: HP, Microsoft & Intel

Appliance video
The first appliance in the industry which consolidates and manages thousands of databases, integrates hardware, software and support and is scalable to meet your changing business needs. Learn more

Cisco, EMC, VMware unite behind big data, cloud training initiative
As the IT silos come down, tech pros need to beef up their skills to stay relevant and maximize the business benefits of cloud computing, virtualization, unified networking and big data, according to Cisco and EMC, which have teamed to offer training targeted at tech's hottest data center disciplines. Read More

Cool old Ethernet paraphernalia
Ethernet is almost 40 years old. Here's a look at some of its product origins Read More

What do you want mobile phones to do in the next 40 years?
It's hard to believe that next year will be the 40th anniversary of the first handheld mobile phone call. What's also hard to fathom is that first call, between the father of the cell phone Martin Cooper, then of Motorola made to Joel Engel of Bell Labs was made on a phone that weighed over two pounds and cost nearly $4,000 and had a battery life of about 30 minutes. Read More

Android 'Ice Cream Sandwich' adoption still stuck in the low single digits
Although it's been over half a year since Google unveiled Android 4.0 ("Ice Cream Sandwich"), the platform has been adopted by just under 3% of all Android devices. Read More


WHITE PAPER: Quest Software

vRanger Helps Cut Replication Time by Almost 70%
There's a reason why more than 38,000 customers trust vRanger to protect their critical virtual data! In this Quest Software case study, see how vRanger helped Cornerstone Bancshares, Inc. cut replication time from days to minutes – and how this translated to real time and money savings. Read Now!

A Report on ICANN 43: New gTLDs and DNSSEC
The Internet's governing body, The Internet Corporation for Assigned Names and Numbers, holds three public meetings per year to discuss how ICANN can help make the network more secure and to encourage end-to-end interoperability. The most recent meeting in Costa Rica in March featured two rich information sharing sessions, one on the new generic top-level domains (gTLDs) program and the other on Domain Name System Security Extensions (DNSSEC). Read More

Terremark launches private cloud offering
Terremark is offering enterprises a new private cloud service that includes the option to burst onto a public cloud. Read More

IBM releases DB2 version 10, the first big upgrade in four years
Sensing a change in the way customers store and analyze data, IBM has updated its flagship DB2 relational database management software to handle a wider range of data processing duties. The company has also updated its InfoSphere data warehouse software, IBM announced Tuesday. Read More

5 annoying help desk calls -- and how to banish them
The help desk is a hotbed of activity these days. Read More


WHITE PAPER: NetIQ

Simplify Compliance and Security
This introduction to NetIQ Sentinel Log Manager provides insight into a flexible and cost-efficient software appliance that lights a clear path to complete, real-time, identity-aware security information and event management. Learn More!

Researchers: Those nasty, offensive violent video games make players....cooperative
New research sugggests you're better off being cooperative than aggressive to succeed when playing violent video games. Researchers from the University of Gothenburg, Sweden, say their findings raise questions about the common perception of there being a link between violent computer games and aggressive behavior. They've published their study on How Gamers Manage Aggression in the International Journal... Read More

Venture capital no longer hates us, Amazon.com's CTO says
When Amazon Web Services launched a few years ago, the venture capital community wasn't a big fan. Read More

Dell buys application modernization firm Clerity
Dell said Tuesday it has purchased application modernization vendor Clerity Solutions, in its second enterprise software-related acquisition news this week. Read More

Are Facebook passwords fair game for employers?
The Associated Press in late March reported on the issue of employers asking job applicants for their Facebook passwords, citing new and old incidents. The story apparently hit a sore point because it was all over the press within a day or so and in short order politicians were posturing and reaching for the limelight by introducing legislation to ban the practice and sending letters to enforcement agencies demanding action. Read More

How Secure Is the Cloud? IT Pros Speak Up
The cloud promises reduced costs and increased flexibility, but it also raises security concerns. Most IT professionals cite cloud security as a high priority, but a whopping 82 percent also trust it enough to use it. For more on how your peers view cloud security, check out our data-packed infographic. Read More

 
 
 

SLIDESHOWS

8 reasons why Windows 8 may not be ready for the desktop
How does this early version work as a traditional desktop/notebook OS?

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Citrix ditches OpenStack for Apache
  2. Dell's acquisition a Wyse one, analysts say
  3. Cool, weird and unusual security gear
  4. 8 reasons why Windows 8 may not be ready for the desktop
  5. Meet Cisco/Insieme's recruiter
  6. IETF attendees re-engineer their hotel's Wi-Fi network
  7. Google's 2012 April Fools' Day pranks
  8. 10 funny (?) April Fools' pranks - Web style
  9. 'Kelso' as Steve Jobs just doesn't sound right
  10. If the best technology won we would all be using OS/2
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: