Search This Blog

Tuesday, November 18, 2014

Microsoft: 'Nobody loves developers more than us'

  How to set up 802.1X client settings in Windows | Windows Phone did well at Mobile Pwn2Own, iPhone 5S, Galaxy S5, Nexus 5 & Fire Phone fell

 
  Network World Microsoft  

Microsoft: 'Nobody loves developers more than us'
Last week, Microsoft made huge waves when it announced that its long-proprietary .Net application framework was now available as open source, completely rocking the Redmond, Wash., giant's cross-platform strategy and public image, all in one fell swoop. It's the latest, and arguably the biggest shift in strategy for Microsoft as new CEO Satya Nadella steers the company away from its proprietary past toward a future as an open services platform. Read More
 


: McAfee

Needle in a Datastack Report
The volume of security-related data today can make identifying a threat like looking for a needle in a haystack. Yet collecting more data also plays a transformational role in information security. Organizations need to learn how to harness and sift through this wealth of information to protect themselves from the threats they face every day. Learn more >>

WHITE PAPER: HP

Top 5 Truths About Big Data Hype and Security Intelligence
Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points out that no available BDSA solutions come close to these forecasts. Nevertheless, the principles of Big Data are the key to advanced security intelligence. This white paper discusses the key tenets of Big Data. Learn more >>

 

INSIDER
How to set up 802.1X client settings in Windows
  Understanding all the 802.1X client settings in Windows can certainly help during deployment and support of an 802.1X network. This is especially true when manual configuration of the settings is required, such as in a domain environment or when fine-tuning wireless roaming for latency-sensitive clients and applications, like VoIP and video. Read More

 

Windows Phone did well at Mobile Pwn2Own, iPhone 5S, Galaxy S5, Nexus 5 & Fire Phone fell
While no smartphone targeted by security researchers during 2014 Mobile Pwn2Own came out completely unscathed, the hackers were unable to gain total control over a Windows and Android phone. Read More
 

Microsoft Rebrands Lync as Skype for Business
In a blog post last week, Microsoft's corporate VP for Skype Gurdeep Pall revealed changes for Microsoft Lync with a new name, a new user interface, and new features. Read More
 


: Pivotal

Big Data Analytics
In this in-depth PDF, InfoWorld explains how to make sense of big data using new analysis tools and abundant processing power to pluck critical insights from the massive volumes of corporate and external data. View now

Google quadruples Nobel Prize in Computing to $1M
The Association for Computing Machinery (ACM) has announced that its annual A.M. Turing Award, sometimes called the Nobel Prize in Computing, will now come with a $1M award courtesy of Google. Read More
 

Microsoft open sources all of the .Net framework
In the latest sign that there is a new regime at Microsoft, the company announced it will release the full server-side stack of the .Net framework as open source code, and that Visual Studio 2013 will be free for small teams of developers. Read More
 

Nokia makes a consumer comeback with N1 Android tablet
Nokia is once again developing mobile devices, and this time the company is using Android. The N1 tablet has a high-resolution 7.9-inch screen and a 5-megapixel front camera. Read More
 


WEBCAST: EMC

Redefine Your Mission-Critical Cloud with VMAX3
This webinar examines how EMC's VMAX3 storage solution provides unprecedented reliability, agility, cost-effectiveness and power in today's demanding storage environments. Learn More

New ransomware CoinVault allows users to decrypt one file for free
Cybercriminals behind a new ransomware program called CoinVault are trying out a new psychological tactic to convince users to pay up—freebies. Read More
 

Microsoft: Competing AV vendors need to remember who the bad guys are
AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday. Read More
 

Microsoft finally fusing Yammer-Office 365 sign-on systems
Well, that took longer than expected. Although Microsoft began bundling Yammer with Office 365 shortly after acquiring the enterprise social networking (ESN) startup in mid-2012, users so far have had to log in separately to both suites, an inconvenience that will soon end. Read More
 

 

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. 20-plus eye-popping Black Friday 2014 tech deals

2. Mobile Pwn2Own: Windows Phone does well, iPhone 5S, Galaxy S5, Nexus 5, Fire Phone fall

3. Peeping into 73,000 unsecured security cameras thanks to default passwords

4. Black Friday iPhone 6, iPad Air deals spill forth from Walmart

5. 8 free online courses to grow your tech skills

6. 20 cool things you can do with a Raspberry Pi

7. Ten operating systems for the Raspberry Pi

8. Intel turns to light beams to speed up supercomputers

9. Cisco winning SDN battle: Chambers

10. 8 tech buzzwords that you need to know


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: