Search This Blog

Thursday, November 20, 2014

Cool Yule Tools: Best techie gifts for 2014

Network World Cool Tools - Newsletter - networkworld.com
  15 can't-miss products at DEMO Fall 2014 | Fidelity peers into the future of investing by building customers virtual cities

 
  Network World Cool Tools  

Cool Yule Tools: Best techie gifts for 2014
Our motto: "He Sees You When You're Sleeping, He Knows When You're Awake…"Image by Troy GalluzziAfter months of investigations, cups of coffee and several arm-twisting interrogation tactics, the Cool Yule Tools staff of writers and editors has discovered a shocking truth. The government group that has allegedly been spying on us, known as the "NSA", is actually a cover group for a little-known organization with headquarters near the North Pole. Yes, we are speaking of the National Santa Agency. (See full writeups on these products.)To read this article in full or to leave a comment, please click here Read More
 


: Brother International Corp.
 
Virtual Training Programs for Remote Sales Agents
Vehicle Protection Plus can train their sales agents, and get them productive, regardless of location using OmniJoin web conferencing. Find out how. Learn More>>

WHITE PAPER: Brother International Corp.

How Secure are your Web Meetings?
OmniJoin offers a full suite of security features to give you the peace of mind that your web meetings are as secure as you need them to be. Learn More>>

15 can't-miss products at DEMO Fall 2014
DEMO Fall 2014DEMO has served as a launching pad for startups that have gone on to become some of the world's biggest companies, from Netscape Navigator and TiVo to VMware and Salesforce.com. With DEMO Fall 2014 set to kick off today, here are 15 new products to check out.MakeTimeImage by YouTube.comTo read this article in full or to leave a comment, please click here Read More
 

Fidelity peers into the future of investing by building customers virtual cities
Fidelity Investments today announced a cutting edge way for customers to check on the health of their investments – by donning 3D goggles and peering around a personalized city where the size of each building relates to the health of their various stock holdings, giving them a quick way to gauge change without poring over numbers. Sound like science fiction? It feels a bit like that when you don the Oculus Rift 3D goggles and experience StockCity firsthand, but that's OK, says Seth Brooks, director of product management for Fidelity Labs, which the company describes as its R&D think-tank. "This is an experiment. We can develop minimally viable products and get these early stage efforts in front of users to get feedback and see what is worth pursuing," (see a video at http://youtu.be/YQ2-8_2Vwpw). To read this article in full or to leave a comment, please click here Read More
 

10 Android Lollipop features Apple should 'borrow' for iOS 9
Apple and Google are locked in a never-ending game of catch-up. Each time a new version of iOS or Android is announced, there are just as many borrowed features as new ones, as each side studies and pilfers the other's ideas to find ways to better its own experience. Android L's Material Design is awfully similar to iOS 7's flattened design language, and iOS 8's newfound openness certainly owes a debt to Lollipop's predecessors. + ALSO ON NETWORK WORLD 12 great Lollipop APIs every Android 5.0 developer will love +To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Binary Tree
 
SMART: Best Practices for Migrating the Corporate Directory
A cornerstone of any IT infrastructure, Microsoft Active Directory plays a central role, determining access to and usage rights for IT resources. Migrating AD to a new environment must be planned and managed carefully using best practices, while maintaining operations and user functionality. Learn More

What's Next for Nokia? A Mysterious Black Box
Mere days after Nokia's CEO said the company is able to license its iconic name to "other devices" (read: not smartphones) immediately, despite the recent sale of its device business to Microsoft, the Nokia Twitter account just cryptically teased a black box that strongly resembles a set-top box. Actually, it looks an awful lot like the Apple TV, only sporting the Nokia name rather than the famous fruit logo. Or maybe a Chromebox?To read this article in full or to leave a comment, please click here Read More
 

9 New Twitter Features and Tweaks Coming in 2015
New Twitter Tweaks and Feature AdditionsImage by ShutterstockTwitter came out swinging last week at its first-ever analyst day with a series of plans to improve existing features and add new ones during the coming months. The company faces challenges, but it appears to have finally moved beyond testing and experimentation to deliberate implementation. More than 500 million tweets are posted every day on Twitter. The company's goal is not necessarily to get more content on the platform but to increase engagement and surface more of its best and most relevant content. Here are nine new Twitter features or changes aimed at achieving those goals and expected in the coming weeks and months.To read this article in full or to leave a comment, please click here Read More
 

Now you can search every tweet that was ever sent
Want to look at tweets posted during the 2008 summer Olympics? Or tweets you sent on your vacation a few years ago? Soon you'll be able to. Twitter is enabling users to search through its entire index of roughly half a trillion public tweets.The archive is massive, but searching through it hasn't always produced the most complete results. The search function emphasizes tweets that are popular, like those that get lots of retweets. But beyond a certain point, the results taper off.Now, every public tweet since Twitter's launch in 2006 is fair game. The change is being rolled out over the next few days to the Twitter website as well as to its iOS and Android apps.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

Samsung to reduce its smartphone range by a third
Samsung Electronics plans to cut the size of it smartphone range almost by a third in 2015 as Chinese rivals eat into its market share and profitability with cheaper devices.The South Korean company will reduce the number of smartphone models it produces by around 25 to 30 percent, said Robert Yi, Samsung's head of investor relations, during a company presentation in New York. A spokesman in Seoul confirmed the plan on Tuesday.The move comes after the world's largest smartphone maker saw its market share drop to 23.8 percent in the third quarter, from 32.5 percent a year ago, while Chinese manufacturer Xiaomi rose to third place behind second-ranked Apple, according to figures from IDC.To read this article in full or to leave a comment, please click here Read More
 

Smartphone encryption – What does it mean to you?
  Why are legislators considering going to congress for access to our cell phones? What has changed recently to motivate these demands for legislative changes?  The Communications Assistance for Law Enforcement Act, or CALEA, passed in 1994, gave access to our voice communications to wiretap our phone  to members of the law enforcement community.  This law required all telephone service providers to make it possible for law enforcement to wiretap phones. The law did not anticipate any of the new technology which is now commonplace. The access is still permissible, but now the data and metadata which used to be accessible are garbled. The two main cellular operating system (OS) vendors, Apple and Google with their respective iOS and Android operating systems, have recently implemented new security protocols for data storage, which automatically encrypt the information stored on the mobile devices which use these OSs. Both Apple and Google use very sophisticated encryption algorithms, which can take years of processing power to decrypt a single device. Further, neither vendor built a "back door" for access without the user password into their device.To read this article in full or to leave a comment, please click here Read More
 

4K TV programming coming to DirecTV
Much as it is in the world of smartphones, the TV industry is also on an endless search for the the next big thing. For a while, some assumed that 3D TV would be the next big feature that would catalyze TV sales. 3D TV, though, never quite gained any traction in the market place, in part because the feature required users to wear clunky glasses and also because the value of proposition of the 3D viewing experience was marginal at best.So in comes 4K. For those who are unfamiliar, 4K quality content offers vastly superior resolution than 1080p and is truly something one has to see in person to fully appreciate. As an avid TV watcher myself, I think it's fair to say that the value proposition in jumping from 1080p to 4K is as stark as it was going from standard definition to HD 720p back in the day.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. How does a Windows bug go undetected for 19 years?

2. 20-plus eye-popping Black Friday 2014 tech deals

3. Microsoft releases emergency patch to stymie Windows Server attacks

4. 10 hottest IT skills for 2015

5. Cisco open sources security

6. The SWAMP: How to avoid the coming software armageddon

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. The 10 mightiest supercomputers on the planet

9. Cool Yule Tools: Best techie gifts for 2014

10. 10 enterprise Internet of Things deployments with actual results


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: