Thursday, May 20, 2010

My makeshift 3G iPad

Will your future cube-mate be a robot? | 7 More Things Not to Do on Facebook

Network World Cool Tools

Forward this to a Friend >>>


My makeshift 3G iPad
Since getting the Wi-Fi only version of the Apple iPad, I've been using it in two main locations - at home and at work, which both have very good Wi-Fi connections and a higher-speed backhaul. That changes today, as I'm heading to New York for a quick trip, and I wanted to see how the experience would be away from those two safe confines. Read More


WEBCAST: Dell

Desktop Virtualization: Right for Every Organization
Desktop virtualization is here and it's here to stay . But what are the benefits, challenges and what can you do to get started on the right foot? In this exclusive webcast, hear from Dell and Intel experts on how to tap into this transformative trend. View Now

WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Will your future cube-mate be a robot?
I love robots, but I'm not sure yet whether I want to sit and talk to them all day long. Even if the robot represents a remote co-worker who is across the country. Read More

7 More Things Not to Do on Facebook
There's a Yahoo Finance link that's going around the social-o-sphere called "7 Things to Stop Doing Now on Facebook", with good advice like not posting your birthday, mentioning that you're going to be away from your house or using a weak password. Good, solid stuff, that we should all be doing anyway. But that's just the start. Read More


WEBCAST: Actuate

Solve Data Needs: BIRT Defined
This webcast will give you a primer on BIRT including the technology and the community. BIRT can help you overcome the challenge of delivering accurate and meaningful data to users while minimizing IT development efforts. Learn more today!

Future cars! GM shows the EN-V
Future cars! GM shows the EN-V. Read More

Teddy bear robot not creepy
Teddy bear robot not creepy. Read More


WEBCAST: Meraki

Cloud-Managed WiFi
Learn how cloud-managed wireless access points can be self-configured and centrally managed over the web, provide secured access for employees and guests, be scalable for networks of all sizes, and provide a cost savings of up to 50% over traditional solutions. Click here.

Robots protect Marines on battlefield
Robots protect Marines on battlefield. Read More

Feel like Luke Skywalker at your next meeting
There must be some Star Wars fans at Kensington, because they just announced a new Wireless Presenter Pro device with a green laser pointer option, instead of red. Why Star Wars? Because green was the color of Luke Skywalker's light saber Return of the Jedi (geek alert, it started out blue, but then turned green later). Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Black duck eggs and other secrets of Chinese hackers
  2. I could license you to use this software, but then I'd have to kill you
  3. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  4. USB worm named biggest PC threat
  5. VA disconnects Sprint's voice, data services
  6. Sun's stars: Where are they now?
  7. Cisco buys Moto -- no, not that Moto
  8. Facebook users warned of sexy 'Candid camera prank' attack
  9. EFF: Forget cookies, your browser has fingerprints
  10. Microsoft counters Gmail with Hotmail overhaul

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment