Search This Blog

Thursday, August 02, 2012

Beyond the smartphone: Emerging platforms developers should target next

  Wikipedia-sponsored 'pilot study' lauds Wikipedia accuracy | Microsoft calls Windows 8 complete, but concerns remain, say analysts
 
  Network World Daily News AM

Forward this to a Friend >>>


Beyond the smartphone: Emerging platforms developers should target next
From the car to the living room, technologies and markets are quickly evolving to offer lucrative possibilities for programming pioneers Read More


RESOURCE COMPLIMENTS OF: RIM

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WHITE PAPER: Silver Peak Systems, Inc.

Guide to Lower WAN Optimization Costs
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

Wikipedia-sponsored 'pilot study' lauds Wikipedia accuracy
While Wikipedia's parent organization is taking great pains to emphasize the small sample size used in research it sponsored to spur others into more thoroughly assessing the online encyclopedia's quality and accuracy, there's no hiding its overall view of the results: We aced this test. Read More

Microsoft calls Windows 8 complete, but concerns remain, say analysts
Microsoft today announced that it's wrapped up Windows 8 and declared that the operating system has met the "release to manufacturing" (RTM) milestone. Read More

Getting out in front of BYOD
It wasn't long ago that BYO was something you'd find on a party invitation. But with the wave of employees bringing their own smartphones and tablets into the workplace and expecting to use them for email, network access and mobile apps, BYOD -- or "bring your own device" -- now represents a promising but formidable business trend that doesn't leave IT in the mood for celebration. Read More


WHITE PAPER: Silver Peak Systems, Inc.

3 Main Factors Lowering WAN Throughput
Upgrading bandwidth does not help improve effective throughput when transferring large amounts of data over a high-capacity WAN. This NetForecast report details the problem's culprits and discusses the effectiveness of TCP acceleration, FEC, packet order correction, and WAN optimization. Learn more.

Don't buy that security software!
Open source doesn't have to mean free of cost, but thanks to the generosity of open source developers many thousands of great applications are free. Why spend money when you don't have to? Though if you like and depend on an app, nothing says thanks like clicking the "Donate" button. Read More

Apple initially wanted an iPhone with shaped glass, deposition reveals
The Apple-Samsung trial has provided us with an absolute treasure trove of information regarding Apple's iPhone and iPad prototypes. From an 8-sided iPhone prototype to an iPhone that resembles an iPod Mini of yore, poring through many of Apple's prototypes that never made it to market has been rather fascinating. Read More

Dropbox gets a black eye in spam attack
The Dropbox file-sharing service suffered a setback in its efforts to move into the enterprise more forcefull after being hit by a spam attackthat stemmed from the breach of an employee's account. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Proven Techniques to Cope with Packet Loss
If you have a WAN link with an RTT of 100 ms and packet loss of 1% the throughput is virtually nil. Learn how to overcome this issue in this paper that highlights: - Key WAN characteristics of out of order and lost packets - Packet loss impact on data replication - How MPLS statistics fool network professionals Learn more.

Huawei checking claims of vulnerabilities in its routers
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend. Read More

DEFCON Kids: Hacking roller coasters and the power grid with cell phones
When you think about hacking conferences with about 15,000 hackers attending, 8-year-old kids might not be your first thought. Yet Def Con Kids was so amazing that I cannot encourage you enough to enroll your kids next year. Read More

BYOD means users want a 'Goldilocks' answer for device security
When it comes to securing mobile devices in a bring-your-own-device (BYOD) world, users are increasingly looking for what could be called the "Goldilocks" solution -- neither too much security, nor too little. Read More

Businesses Fill Hadoop Skills Needs With Partners
Enterprises are adopting Hadoop faster than they can hire IT talent to build and maintain these distributed computing deployments. To fill the gap, many are turning to partners that can offer a mix of Hadoop consulting, software development and training services. Read More

 
 
 

SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft kissing Hotmail goodbye
  2. IBM attempts to redefine the IPS
  3. New data center design boasts 'world's most efficient cooling system'
  4. Following Xsigo acquisition, Oracle becomes the Apple of enterprise IT
  5. Outsourcers apparently don't miss a beat in face of massive India power outage
  6. Leaked Windows Phone 8 SDK brings app surprises
  7. In face of Flame malware, Microsoft will revamp Windows encryption keys
  8. Netflix uncages Chaos Monkey disaster testing system
  9. Meet the new email boss Outlook.com, not the same as the old boss Hotmail
  10. iPhone 5 unveiling set for Sept. 12, rumors claim
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: