Search This Blog

Wednesday, November 26, 2014

We take Android Auto for a test drive

8 significant software releases of 2014 | 5 ways to escape password hell

Network World Linux and Open Source

IDG Contributor Network: Android Auto extends your phone to your car
For those who've hacked an Android tablet as navigation and entertainment device for the car, as I have, here's some good news for you: no more hacks. Android Auto is a seamless cast of your Android phone-to-car center-stack. Google and Hyundai demonstrated the kit in a 2015 Hyundai Sonata last week at the pre-auto show here in sunny Los Angeles. I had a chance to give it a try.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Code 42

Enterprise Mobile Security Checklist
Here are a few considerations to help evaluate your environment before implementing an enterprise mobility management (EMM) strategy or any other mobile security policies. Learn More

WHITE PAPER: Code 42

Enterprise Mobility Management Checklist
Read this checklist for tips and considerations when creating your own Enterprise Mobility Management (EMM) strategy. Learn More.

INSIDER
8 significant software releases of 2014
We looked back at the multitude of software releases in 2014, and selected ones that made an impact. Many of these could continue to transform the tech industry into 2015 and beyond.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: PC Connection | EMC

XtremIO – Make an Informed Flash Decision
What does better storage mean for your business? How do you hope to improve your storage efficiency? What form do you expect IT innovation to take in your organization? Learn More

INSIDER
5 ways to escape password hell
Security can be a vicious cycle. A breach occurs. Enterprises add a new level of security. That increases inconvenience for users, who find workarounds. Then there's another breach and the cycle begins again.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: Dell Software

The Top 10 Things DBAs Should Know About Toad for IBM DB2
Toad for IBM DB2 is a powerful tool for the database administrator. But it's some of its newer and lesser known features that provide the great productivity benefits in the DBA's day-to-day work. Do you know the top 10 features of Toad for IBM DB2? Download this white paper and find out. View now

INSIDER
IT modernization project makes the grade at North Carolina colleges
The opportunity to save money, power and space is driving a multi-campus infrastructure modernization project within North Carolina Community Colleges (NCCC), a network of 58 institutions serving more than 800,000 students. So far 14 colleges throughout the state have upgraded to new servers that are more energy efficient, use less space and deliver higher performance than the systems they're replacing.To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 14 go-to tools for Mac sysadmins

2. 11 technologies Apple has killed

3. No, Walmart, you can't walk away with my smartphone for price-matching purposes

4. Google launching 20 Internet balloons per day

5. 11 Black Friday deals for HP Pavilion All-in-One PCs with Windows 8.1

6. 20+ Jaw-Dropping Black Friday 2014 Tech Deals

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Regin is groundbreaking malware on par with Stuxnet, Symantec says

9. SDN groups respond to Cisco's game over

10. Microsoft cold-shoulders Server 2003 and XP users hit with Microsoft Update error 0x80248015


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: