Monday, August 13, 2012

25 essential business apps for Android

  The cloud services explosion | DLP tools deliver strong endpoint protection
 
  Network World Daily News PM

Forward this to a Friend >>>


25 essential business apps for Android
Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Quickly Identify Misconfigured Active Directory Permissions
What users have access to sensitive files or directories? Find out without tedious manual effort. Troubleshoot permissions issues both locally and on remote shares with SolarWinds free tool, Permissions Analyzer for Active Directory. Easily see what permissions a user or group of users has for an object and why. Get a complete hierarchical view of the effective permission and access rights for a specific file folder or share drive today by downloading the free tool. Get Permissions Analyzer for Active Directory >>

WEBCAST: Oracle

Live: 2012 Database Management Survey Results
Date: Thursday, August 30, 2012, 1:00 PM EDT Learn how your experience stacks up against your peers and gain insight on strategies to address the most pressing issues as new survey results on managing databases are revealed by Crimson Consulting in this live Webcast. Learn More

The cloud services explosion
If you follow cloud computing, you're no doubt familiar with software-as a service, typically associated with Salesforce.com, or infrastructure as a service, which was pioneered by Amazon.com. But how about CaaS, SECaaS, DaaS, MaaS and BaaS? Read More

DLP tools deliver strong endpoint protection
With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address. Read More

How we tested DLP products
We tested multiple common endpoint scenarios, by trying to upload, print, email or otherwise transfer data that should be blocked, quarantined, warned about or simply monitored under the rules and policies we set up. The following specific types of endpoint tests were conducted: Read More

Does your browser support 'do-not-track'?
Microsoft angered advertisers when it confirmed that it would enable do-not-track mode in its upcoming Internet Explorer 10 browser -- the IE version that will be designed for use with Windows 8. Read More

Windows Phone 8 hardware to compete with Android's best. Maybe.
Microsoft has already disclosed quite a few details regarding Windows Phone 8. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

'WAN Optimization': the key WAN technology advance of the past decade
In our last several columns, we've been exploring the history of the Enterprise WAN and the consequences of that history. Read More

Hendrickson keeps on truckin' with UCaaS
Hendrickson International Corporation is a leading global supplier of truck, tractor, bus and recreational vehicle suspension and heavy-duty spring components to the commercial transportation industry. Read More

iPhone 5 to come with much smaller 8-pin dock connector
Though Apple hasn't made any official announcement just yet, it's largely believed, and based on a number of credible reports, that the official iPhone 5 unveiling is set to take place on September 12. It's also believed that the official iPhone 5 launch will take place 9 days later on Friday, September 21. Read More

The best tech investment I never made: Four CIOs' tales
IT leaders must learn to tell whether a new technology will transform their businesses -- or just become the next boondoggle. Four CIOs offer their perspectives. Read More

Red Hat to release enterprise-ready OpenStack package
Red Hat plans to release an enterprise grade version of the OpenStack open source software for hosting IaaS (infrastructure as a service) deployments. The company has posted an unsupported preview edition of the package, ahead of its full commercial release, expected in early 2013. Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

Cisco Ironport delivers strong email protection
The Cisco Ironport is an appliance that is deployed into an existing mail infrastructure. All emails are sent to the IronPort and the IronPort is either the last point out (most common configuration) or it can process email and then send it back to the mail server where it is sent out. Read More

The security game changes when the bad guys are backed by foreign governments
Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most critical networks. Now that many of those same countries are after intellectual property housed by enterprise shops, commercial customers are knocking at Fidelis' door looking for help. Network World Editor in Chief John Dix talked to Fidelis CEO Peter George about the shifting threat landscape and what companies are doing to cope. Read More

Google weighs in with Android 4.1 engineering that will 'touch' you
User experience is critical in the competition between Google Android and Apple iOS devices. In the last few years the pixel density of mobile device displays has exceeded memory speeds to move bits out of memory and render graphics and animations. This is a phenomenon of larger and denser LCDs designed in phones and tablets. Android's engineering challenge is to orchestrate the processing of touch,... Read More

Google to buy travel brand Frommer's
Google plans to buy the travel guide publisher Frommer's, as well as other travel publishing assets, from John Wiley & Sons, as the search company continues beefing up its original content. Read More

Possible hidden pyramids discovered in Egypt, thanks to Google Earth
While the rest of us use Google Earth to zoom in on our own backyards, two researchers recently used it to make what could amount to a groundbreaking discovery. Satellite archaeology researcher Angela Micol used Google's 3D mapping service to spot two separate, previously undiscovered sites in Egypt that resemble the famed Giza Plateau pyramids. Read More

 
 
 

SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 to come with much smaller 8-pin dock connector
  2. WikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying system
  3. Cisco readying a new Nexus switch
  4. 10 trends driving big data in financial services
  5. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  6. Apple suppliers' banner July suggests iPhone 5, iPad mini launches imminent
  7. Top 5 cities for big data jobs
  8. Steam on Ubuntu could hurt gaming on Linux
  9. IBM claims spintronics memory breakthrough
  10. Open-source movements butt heads over logo
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment