Search This Blog

Monday, July 28, 2014

17 obscure Windows tools and tricks too powerful to overlook

Network World Mobile & Wireless - Newsletter - networkworld.com
House passes cellphone unlocking bill that now only needs Obama's signature | Netgear Nighthawk X6 Wi-Fi router review: The best router for a crowded house

Network World Mobile & Wireless

Forward this to a Friend >>>


17 obscure Windows tools and tricks too powerful to overlook
Windows is chock full of handy-dandy power tools, but most of them are hidden from everyday view. These are the ones you need to know about. Read More


: Smartling

Travel App Expands via Robust Translation Management System
Using Smartling's translation management platform, Hotel Tonight, a popular mobile travel app used to book same-day hotel stays, was able to grow its business internationally. In this case study, you'll learn about how Hotel Tonight was able to quickly expand into key tourism markets. Learn More

WHITE PAPER: VCE

Business Benefits of Running SAP on Converged Infrastructure
Forrester Consulting conducted a Total Economic Impact™ study and examined the potential return on investment (ROI) enterprises may realize by replatforming SAP on factory-integrated systems. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact on their organization. Learn more

House passes cellphone unlocking bill that now only needs Obama's signature
The U.S. House of Representatives has just passed a bill that will in effect give consumers the right to unlock their cellphones, meaning the legislation is only a presidential signature away from becoming law. Read More

Netgear Nighthawk X6 Wi-Fi router review: The best router for a crowded house
It's not the fastest, but it can do tricks the competition can't. Read More

INSIDER
Business leaders know: Let in the smartphones, tablets, laptops
Forward-thinking firms like Kraft didn't wait for employees to bring in consumer tech, but led the effort themselves Read More

Juniper jettisons mobile security biz
Sells Junos Pulse to private equity firm for $250 million Read More


WHITE PAPER: APC by Schneider Electric

High Efficiency AC vs. DC Power Distribution
This paper presents a detailed quantitative efficiency comparison between the most efficient DC and AC power distribution methods, including an analysis of the effects of power distribution efficiency on the cooling power requirement and on total electrical consumption. Learn more

Roadkill app could save human, animal lives
Utah State University researchers are reporting on a new app designed to get a much better read on wildlife-vehicle collisions -- a serious situation that leaves a couple hundred people and about a million animals (vertebrates) in the United States each year. Read More

Are IT groups really ready for BYOD security challenges?
Privately-owned mobile devices, backed by a corporate BYOD policy, are still fairly rare in business, according to a LinkedIn survey. And some companies may not be as prepared as they think for mobile security challenges. Read More

Wearables will make first breakthrough in enterprise, panelists say
Fitbits and smart watches and Google Glass are all well and good, but the most meaningful early use of wearable technology will happen in industrial and enterprise settings, according to experts on a Wednesday panel discussion at the Wearable Tech Expo in New York. Read More

Microsoft verging on single OS across all devices
Microsoft seems on the brink of announcing a major enhancement to its operating system lines, namely merging them into a single OS that could bring big benefits for corporate users. Read More


WHITE PAPER: OutSystems

HTML5 Rocks
With the release of the 5th major version of HTML (aka HTML5), new features that mainly target Web Applications have been introduced, ranging from CSS3 (related technology) to GeoLocation and WebStorage. This article explores the top 5 features that developers should be using now. Read Now

13 Android Tools for Web Developers
Android mobile devices, while not typically thought of as places where development work gets done, can offer surprisingly useful apps to help developers get the job done, anywhere. Read More

BlackBerry offers BES10 as a hosted service through partners
Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners. Read More

File-encrypting Android ransomware 'Simplocker' targets English-speaking users
The malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said Read More

IoT inspires new components for energy, wireless
A vibration-harvesting power supply and a chip architecture for low-power communications are the latest entries Read More

The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)
2014 has featured crop circles, advanced toilet tech, flying saucers, wild software development Read More


Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: