Search This Blog

Wednesday, December 17, 2014

Greatest and goofiest gadgets of 2014

The best office apps for Android | A brief history of Linux malware

Network World Linux and Open Source

INSIDER
How to secure Apple and Android mobile devices using 802.1X
When connecting to an enterprise-secured network with Android devices, users are prompted with many settings that could be confusing. When connecting with iOS devices, users are typically only prompted for their username and password. They can't edit the advanced 802.1X settings on the device, but there are ways to get around this.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: BMC Software

An Insightful Approach to Optimize Mainframe MLC Spend
This paper, "An Insightful Approach to Optimizing Mainframe MLC Costs," discusses how you can penetrate the complexity of IBM mainframe MLC products and the MLC price model to gain insight into the MLC cost drivers and leverage that insight to optimize MLC spend. Learn More

WHITE PAPER: Code 42

Buyer's Guide to Enterprise File Sync and Share
As an IT professional, you understand sync and share software is a growing part of today's workflow—but the workers you support consider it essential to their daily activity. Learn More

The best office apps for Android
Getting serious about mobile productivity We live in an increasingly mobile world -- and while many of us spend our days working on traditional desktops or laptops, we also frequently find ourselves on the road and relying on tablets or smartphones to stay connected and get work done.Where do you turn when it's time for serious productivity on an Android device? The Google Play Store boasts several popular office suite options; at a glance, they all look fairly comparable. But don't be fooled: All Android office apps are not created equal.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

ACM Leadership Guide
Knowledge worker effectiveness has emerged as a top priority to both optimize the customer experience and help employees work more efficiently. See how advanced case management offers a solution to these challenges. Learn More

A brief history of Linux malware
Although not as common as malware targeting Windows or even OS X, security threats to Linux have become both more numerous and more severe in recent years. There are a couple of reasons for that; the mobile explosion has meant that Android (which is Linux-based) is among the most attractive targets for malicious hackers, and the use of Linux as a server OS for and in the data center has also grown; but Linux malware has been around in some form since well before the turn of the century. Have a look.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: PC Connection | EMC

Dual Perspectives on ITaaS
This global survey by IDG Research Services of more than 350 IT and BU directors at enterprises of 1,000 employees or more reveals significant differences in the perception and priorities of business and IT when it comes to many aspects of running IT like a business. Based on a global survey conducted by IDG (CIO), EMC and VMware. View Now

The 10 greatest and goofiest gadgets of 2014
We look back at the tech products that were released for sale to the general public in 2014, and picked out the ones that left an impression. Being popular or top-selling wasn't a deciding factor. Instead, trying to stand out from others, or introducing new ideas, even bad ideas, was. Read More


SLIDESHOWS

A brief history of Linux malware

A look at some of the worms and viruses and Trojans that have plagued Linux throughout the years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco becomes a Big Data analytics provider with 'mist' computing

2. Riverbed goes private in $3.6 billion deal

3. Hackers to Sony staff: Email us to keep your secrets private

4. Microsoft gets allies to help tell US to back off on Irish search warrant

5. Illinois hospital reports data blackmail

6. How to secure Apple and Android mobile devices using 802.1X

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. The best office apps for Android

9. Sony hackers release more data, promise 'Christmas gift'

10. Was 2014 the beginning of the end for Samsung?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: