Search This Blog

Monday, November 05, 2012

7 things we love/hate re: Microsoft Office 2013 for Windows RT

  Brocade buys Cisco nemesis Vyatta | VMware CTO: Adapt, enable choice, or die
 
  Network World Daily News PM

Forward this to a Friend >>>


7 things we love/hate about Microsoft Office 2013 for Windows RT
Read More


WHITE PAPER: HP

Tie Together Multi-Vendor Devices in the Enterprise Network
The complexity of multi-vendor network management is bogging down IT. Discover a platform that provides comprehensive insights into the network across the entire enterprise – from wired and wireless networks to physical and virtual environments. Manage all network resources, services and users with one tool, regardless of device manufacturer. Learn More

WHITE PAPER: CDW & Symantec

Don't Wait for Disaster to Strike
It's inevitable. At some point your business will experience data loss. It could be a simple PC meltdown, a hard-drive crash or something much worse. See what happens if you neglect to protect your mission-critical applications and data, and learn what you can do to mitigate disaster. Learn More.

Brocade buys Cisco nemesis Vyatta
Brocade has announced its acquisition of Vyatta, a privately held maker of open source-based network software, for an undisclosed amount of cash. Read More

VMware CTO: Adapt, enable choice, or die
To some outsiders looking in, VMware has gone through quite a change recently by purchasing two companies, embracing OpenStack enabling multi-cloud support. CTO Steve Herrod says it's all part of the broader plan. Read More

GM plans to hire 3,000 HP IT workers
Hewlett-Packard has agreed to transfer 3,000 of its employees to the General Motors payroll, as the automaker moves IT operations in-house Read More

Programmer and 'bionic leg' ace 103-story test
Software engineer using mind-controlled prosthetic limb scales Chicago tower Read More


WHITE PAPER: Cisco

Understanding the Options to Find the Right Fit
Wondering which cloud collaboration solution is best for your business? Learn the four key factors you must consider when choosing a supplier--and find the right solution that will enable faster time to market. Read Now

Election 2012 Live Blog: The technology angle
[View the story "Election 2012 Live Blog: The technology angle" on Storify] Read More

Coke hacked by Chinese and kept it a secret
"I'd like to buy the world a Coke and keep it company"... it's the real thing according to an old musical slogan . . . and it was the real thing when Coca-Cola was targeted by Chinese hackers in 2009. Once upon a time, Coca-Cola wanted "perfect harmony" and even cokes for everyone in the world, including polar bears and penguins, but that meant sharing soft drinks and not company secrets. Read More

IT sector rebounds, gains 12,500 jobs in October
The IT sector is back in growth mode, adding 12,500 jobs in October, according to U.S. employment numbers from the Bureau of Labor Statistics. Read More

Carriers to feds: Fix current telecom deal before starting follow-on
Carriers aren't excited about the General Services Administration's plans for a follow-on contract to Networx -- tentatively dubbed Network Services 2020 -- because they want to see the U.S. government's procurement arm take steps to make the current contract more profitable for them. Read More


WHITE PAPER: AT&T / AT&T Wireless

Extended Enterprise Security: Technology Adoption Profile
In an extended enterprise, IT decision makers are investing more into platforms that enable easy collaboration, utility scaling, and real-time customer analytics. This Forrester study looks into extended enterprise technologies and their impact on IT security and operations. Read Now!

Hackers claim attacks against ImageShack, Symantec, PayPal, other websites
Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organizations. Read More

INSIDER
Inside the DreamWorks data center
The data center infrastructure at DreamWorks Imagination Studios is certainly state of the art, but it doesn't make as much use of cloud, virtualization solid-state storage technologies as one might expect. Insider (registration required) Read More

Microsoft Trustworthy Computing finally pays off in a big way
Back in 2002, then-Microsoft CTO and senior vice president Craig Mundie authored a whitepaper on what would become the framework of the company's Trustworthy Computing program. It would be built around four pillars that all Microsoft products would embrace: Security, Privacy, Reliability and Business Integrity. Read More

Scott Forstall and Jony Ive refused to attend each other's meetings
Apple last week delivered a bombshell when it announced that long time Apple veteran Scott Forstall would be leaving the company in 2012. The impetus for Forstall's departure, or perhaps the straw that broke the camel's back, was that Forstall refused to sign off on an apology letter to Apple consumers over the deficiencies in iOS 6 Maps. Read More

Obama would lead if foreigners could vote, website shows
Though citizens of other countries have little say in the matter, the U.S. election undoubtedly has an impact on many of them. Now a new website gives them a chance to at least show how they would vote if they could. Read More

How One Business Uses Social Networking and BPM to Handle Disasters
When a hurricane hit, insurance claim outsourcer Crawford & Company struggled to efficiently deploy adjusters. Here's how business process management and a social application helped the company move beyond whiteboards and sticky notes. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'World's largest' telecom deal turns out to be a dud
  2. iPhone 6 rumor rollup for week ending Oct. 26
  3. Scott Forstall and Jony Ive refused to attend each other's meetings
  4. A vendor-independent comparison of NoSQL databases
  5. SJSU didn't bid Cisco project
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. AMD announces fastest 16-core server chips as ARM future looms
  9. How the Presidential election will impact IT outsourcing
  10. The 5 worst mobile threats of 2012
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: