Search This Blog

Thursday, June 13, 2013

Microsoft's BYOD game plan is surprisingly impartial

It's hitting the fan: Anger mounts over PRISM, NSA domestic spying scandals | 'Crazy ants' that destroy computers are immune to insecticide

Network World Microsoft

Forward this to a Friend >>>


Microsoft's BYOD game plan is surprisingly impartial
BYOD was born out of a rebellion against Microsoft products. Many of the people bringing their own laptops to work were bringing in Macs instead of Windows PCs, alongside their iPhones. No matter, Microsoft is set to introduce a slew of client and server technologies to support BYOD, both Microsoft and non-Microsoft devices. Read More


WHITE PAPER: Tripwire

So Much Data, So Little Control
It used to be that all you had to do to protect your company's intellectual property and customer information was lock the file drawers and, later, put layers of defenses around the data center. Learn More

WHITE PAPER: IBM

Businesses are ready for a new approach to IT
Today's businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing. Learn More

It's hitting the fan: Anger mounts over PRISM, NSA domestic spying scandals
A bipartisan group of senators introduced a bill yesterday that would end the "secret law" that keeps government surveillance programs in the shadows. Read More

'Crazy ants' that destroy computers are immune to insecticide
There's a new threat to your-high cost electronics: an ant with a taste for electronic equipment. Nylanderia fulva, more commonly called the "tawny crazy ant," has invaded the south, from Florida to Texas, and is causing damage in electrical gear and outlets everywhere they go. Read More

How to Solve 4 Impending Windows 8 Problems
Enterprises have been slow to adopt Windows 8--and when they have, they've encountered migration, usability, security and hardware issues. Luckily, these challenges aren't impossible to overcome. Read More


WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn More

The new science of software testing
How do you plumb the depths of the product you are testing? How do you define your plans and communicate them effectively, both to yourself and to the team you are supporting? What are the best techniques for accomplishing any of these and how do I know which to employ? Read More

Microsoft protects cloud with directory-integrated two-factor authentication
Microsoft is upping the security on Azure with Active Authentication, a new service now in preview which allows enterprises to secure access to hosted applications such as Office 365 with two-factor authentication. Read More

Is Microsoft's Office 365 Bet Starting to Pay Off in Enterprise Adoption?
Microsoft's subscription-desktop hybrid application updated from the cloud may trigger wider Office 365 adoption in the enterprise, at least that's what the software giant is banking on with its new Office365 ProPlus offering. Read More


WHITE PAPER: VCE

Rompetrol Case Study
Vblock Systems enable operational excellence and the birth of a new business. Learn More.

Microsoft's ambivalence about Office on the Web gives Apple shot with iWork on iCloud
Almost as an afterthought, Apple on Monday announced it was working on browser-based versions of its iWork productivity applications, a move one analyst said challenged Microsoft's Office behemoth. Read More

Facebook, Twitter support Google's call for transparency in surveillance requests
Facebook, Twitter and Microsoft have joined Google in asking for greater transparency in surveillance requests, following widespread criticism of the U.S. government's surveillance programs and the role of the Internet companies. Read More

Microsoft patches critical IE vulnerabilities and actively exploited Office flaw
A new batch of security updates released by Microsoft on Tuesday address a total of 23 vulnerabilities in Internet Explorer, Windows and Microsoft Office, including one that is actively exploited by attackers. The handling of digital certificates in Windows was also improved. Read More

Office 365 customers can now replace SharePoint newsfeed with Yammer
Microsoft has taken the first step in its integration roadmap for SharePoint and Yammer, allowing Office 365 customers to replace SharePoint Online's activity stream with Yammer's. Read More



SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Ubuntu Touch: First look at the Linux smartphone OS

7. Gartner reveals top 10 IT security myths

2. VMware: We're building one of the biggest SDN deployments in the industry

3. Network World First Look: Apple's iOS 7

4. Cisco overtakes IBM as top cloud hardware provider, research firm says

8. iPhone 6 rumor rollup for the week ending June 7

5. Getting the most out of flash storage

9. Cisco looks to standardize context-aware security

6. How to opt out of PRISM, the NSA's spying program

10. Gartner: 7 major trends forcing IT security pros to change


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: