Friday, May 21, 2010

Just when you thought the iPad couldn't be more popular

Juniper seeks to out-virtualize Cisco in data centers | Standing room only for HTML5

Network World Daily News AM

Forward this to a Friend >>>


Just when you thought the iPad couldn't be more popular: survey
A pair of new surveys finds increased consumer interest in Apple's iPad, and extremely high satisfaction among iPad users. Users are not only surfing the Web and checking e-mail but also using applications from Apple's App Store, watching video and reading e-books. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

WHITE PAPER: BMC Software

Integrating and Automating Composite Applications
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible. Learn More

Juniper seeks to out-virtualize Cisco in data centers
Juniper Networks' announcement this week of switches and routers designed to flatten and simplify legacy networks is the latest sign that this company has no intention of backing off in the face of ever stiffer data center competition from Cisco, HP and others. Read More

Standing room only for HTML5
Many conference attendees turned away at Google I/O conference session. Read More

Wal-Mart pushing for chip-and-pin payment cards in U.S.
Wal-Mart wants to see chip-and-pin payment cards adopted in the United States in effort to better secure financial transactions, according to a report from the Smart Card Alliance event this week in Scottsdale, Ariz. Read More

Just How Many Radios Do You Need, Anyway?
I recently attended an IEEE Communications Society event that focused on ZigBee, a very interesting set of radios and protocols mostly designed for telemetry and control applications. And during the entire presentation, my mind wandered back to a fundamental question - how many radios do we really need in a handset? Read More


WHITE PAPER: VMware

Increasing Desktop Virtualization ROI
Make your transition to desktop virtualization as successful as possible with a platform that supports the PCoIP display protocol. You can expect a superior end-user experience and an increased return on investment. PCoIP delivers a 50% reduction in display latency compared with legacy display protocols. Learn More!

Google rolls out Android OS upgrade
Android 2.2 boasts Flash capabilities, a speed boost, and enterprise enhancements like Microsoft Exchange integration. Read More

Google faces off against Microsoft, Apple over Web video standard
Mozilla and Opera Software on Wednesday backed Google's new open-source, royalty-free video format, and all three browser makers issued developer builds incorporating WebM. Read More

FCC frees up 25MHz of wireless spectrum for broadband
The U.S. Federal Communications Commission has adopted rules that would allow mobile broadband providers to offer services on a 25MHz band of spectrum that's been controversial because of interference concerns from satellite radio provider Sirius XM Radio and other users of nearby spectrum. Read More

Do The Laws Of Robotics Apply To Google? WebM May Test It
OK, how well do you remember Asimov's laws of robotics? If you are sci fi fan at all, you had to have read Asimov. If you read Asimov, you had to spend some time thinking about the permeations of the laws of robotics. Google now finds itself in a R. Daneel Olivaw -like conundrum regarding the VP8 video codec and the future of video on the web. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

US looking for technology to quash malicious insider threats
Because so-called trusted insiders are a massive threat to the security of corporate and military resources, it may take an industrial strength technology to mitigate the issue. Read More

Open Source: A license, a community or more?
Open source means different things to different people. To some, it's simply that the software code is out there, available for anyone to download, change and re-release. Maybe it's free; maybe you have to pay for it; maybe the code is free, but support comes with a price. To some, it's a concept. It's a philosophy. It's a way of developing and sharing materials. Read More

Indiana Shaw and the Quest for HSPA+
T-Mobile recently announced that its HSPA+ wireless broadband network was now covering New York City, so they offered me a chance to try the network with its new webConnect Rocket USB stick. Read More

NASA Hubble spots star devouring universe's hottest planet
It must be something like eating the universe's largest and hottest Ghost Pepper. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. I could license you to use this software, but then I'd have to kill you
  2. Black duck eggs and other secrets of Chinese hackers
  3. FTC takes out notorious porn- and botnet-spewing ISP
  4. Standing-room only for HTML5
  5. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  6. My makeshift 3G iPad
  7. LifeLock CEO said to be victim of identity theft 13 times
  8. Symantec to buy VeriSign's authentication business
  9. The Android surge goes global
  10. Win 7 helps Microsoft hit record customer satisfaction score

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment