Search This Blog

Wednesday, May 30, 2012

Scary times ahead for smartphone vendors, says analyst

10 Mobile Device Management Apps to Take Charge of BYOD | Juniper packs 30 new features into Web security software

Network World Daily News AM

Forward this to a Friend >>>


Scary times ahead for smartphone vendors, says analyst
The rest of 2012 will be very challenging for smartphone makers as they struggle to find ways to differentiate their "black slabs," Richard Kramer, managing partner at Arete Research, said during the opening address at the Open Mobile Summit conference in London. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WHITE PAPER: Teradata

Cloud Computing Models for Data Warehousing
Gain better business intelligence through private cloud self service capabilities. In this whitepaper, analyst Mark Madsen explores why private cloud computing is a better choice to meet your analytical needs as business conditions fluctuate and grow. Learn more.

10 Mobile Device Management Apps to Take Charge of BYOD
Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. Read More

Juniper packs 30 new features into Web security software
Juniper Networks this week unveiled enhancements to the Web security software it obtained via the acquisition of Mykonos Software in February. Read More

10 keys for building private clouds
One of the toughest parts about implementing a cloud strategy isn't choosing the underlying technology to power the deployment; it's having the processes in place to manage an effective migration to the cloud, says Thomas Bittman, a cloud analyst for Gartner. Read More

Security startup Vaultive tackles cloud-based encryption
Office 365 is the Microsoft Office suite of desktop applications and hosted versions of Microsoft's server products delivered and accessed over the Internet. Read More


WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

Windows 8 Release Preview leaks to Web
A Chinese edition of Windows 8, reportedly the same build that Microsoft will launch in the next week as the Release Preview, has leaked to file-sharing sites. Read More

Schneier squares off with advocate of airport profiling
Security expert Bruce Schneier opposes the use of ethnic profiling as a part of airport passenger screening, while Sam Harris, author and CEO of Project Reason, believes such profiling makes sense and is avoided merely in deference to political correctness. The two debated their differences via email, says Schneier, and "at 14,000+ words, I only recommend (the transcript) for the most stalwart of readers."... Read More

Sprint gives a date for Nextel iDEN shutdown: Next June
Sprint Nextel will finish shutting down its narrowband iDEN network as early as June 30, 2013, the company disclosed on Tuesday. Read More

Male or female, who's the better social engineer? Battle of the SExes!
I'd be willing to bet that someone has successfully manipulated each of us at some point in our lives. If that manipulation was in regard to a love life relationship, to borrow from Living Colour, Cult Of Personality, "I exploit you, still you love me," people will have different answers for which sex is better at hacking the head and the heart. According to the latest FBI Internet Crime Complaint... Read More


WHITE PAPER: IBM

Is Your Database Ready For Your Company's Future?
This brochure is targeted to executives and will cover all the business benefits of DB2. Learn More

Cloud Leadership Forum 2012: What to expect
Cloud Leadership Forum 2012: What to expect Frank Gens from IDC and John Gallant from IDG Enterprise discuss the upcoming Cloud Leadership Forum (June 12-14, 2012) and what IT and business leaders can expect at the event. From: networkworld Views: 8 0 ratings Time: 04:07 More in Science & Technology Read More

Samsung preps two new Chromebooks as Google updates Chrome OS, Apps
Samsung will launch this week two new Chrome OS-based computers, a laptop and desktop that have been designed to be significantly faster and more versatile than previous models. Read More

Attacks on Iranian oil industry led to Flame malware find
The sophisticated cyber espionage malware known as 'Flame' was discovered after computers within Iran's energy industry were wiped clean of data, a security expert said today. Read More

Rare footage from iPhone production line revealed
A rare glimpse into the iPhone production line at Apple's Foxconn factories in China has been released. Read More

How to Design a Successful RACI Project Plan
No matter how detailed and complete a project plan may be, confusion or omission of participant roles and responsibilities will cause major problems. IT management coach and consultant Bob Kantor outlines the simplest and most effective approach to define and document project roles and responsibilities, and improve project outcomes -- the RACI model. Read More



SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending May 25
  2. Cisco all but kills Cius tablet computer
  3. RIM said to plan to lay off 2,000 staff
  4. Gartner: Don't trust cloud provider to protect your corporate assets
  5. Researchers identify Stuxnet-like cyberespionage malware called 'Flame'
  6. Extreme BYOD: When consumer tech goes to unexpected places
  7. Gearhead: Hardware we want to get our hands on
  8. Sales of unused IPv4 addresses gathering steam
  9. Cisco takes its lumps, keeps developing video meeting tools
  10. Patch management still big stumbling block in risk management, survey shows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: