Monday, January 28, 2013

iPhone 6 rumor rollup for the week ending Jan. 25

  Meet Mageia, a rising Linux star | What IT needs to know about near-field communications
 
  Network World Daily News PM

Forward this to a Friend >>>


New-look newsletter coming soon!
In the coming days, you'll see an exciting new design for the Network World Daily News — a fresher, more engaging look with improved options for sharing content in your social network, but with all the same award-winning technology coverage you've come to expect from Network World. Keep an eye on your inbox!

iPhone 6 rumor rollup for the week ending Jan. 25
The combination of intense cold gripping much of the U.S. and feverish iPhone speculation is creating extreme rumoring conditions, threatening to drive the iOSphere into epistemological collapse. Read More


WHITE PAPER: HP

A Universal Log Management Solution
Do you know where your vulnerabilities are? This white paper discusses the log management landscape and the solution that protects modern networks. Learn more.

RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

Final Day to Register! BYOD & Mobility Management
Attend and learn how to use your organization's appetite for risk as the foundation of your enterprise mobility management policy. BYOD & Mobility Management Tech Seminar. 2/12 - Westin Hotel, Long Beach, CA Click to continue

Meet Mageia, a rising Linux star
If the world of Linux distributions has ever had a rising star, it's Mageia. Read on for a brief tour of Mageia's interface and features. Read More

INSIDER
What IT needs to know about near-field communications
The rise of near-field communications (NFC) has been part of the discussion in the mobile industry for years. Unfortunately, the technology hasn't generated much more than discussion to this point. Read More

HP offering data-breach response and remediation services
HP today announced data-breach remediation services intended to help organizations prepare for an incident related to data loss that would require fast response to meet both legal and digital forensics requirements. Read More

Sex and NSFW clips flood new Vine app from Twitter. Will Apple respond?
Just a few days ago, Twitter unveiled a new app called Vine for the iPhone and iPod Touch. The app enables users to record 6 second videos and embed them within tweets. The videos are played in a loop, so you might liken them to modern day animated gifs. Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

RIM faces 'make or break' with BlackBerry 10
It's finally go time at Research In Motion. After delays that have tested the resolve of even its most enthusiastic customers, the Canadian company will finally launch its BlackBerry 10 OS on Wednesday and the stakes couldn't be higher. Read More

Unseen, all-out cyber war on the U.S. has begun
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet Read More

New bug makes moot Java's latest anti-exploit defenses, claims researcher
Java's new security settings, designed to block "drive-by" browser attacks, can be bypassed by hackers, a researcher announced Sunday. Read More

Press, bloggers fall for iPhone cup holder 'joke'
Hate to say I told you so ... No, wait, I'm fine with saying I told you so: That combination cup holder/iPhone case (right) that was mocked here on Friday is indeed a joke, or a publicity stunt if you prefer (and I do), according to the Dutch marketing firm that pitched it to reporters and the crowdsourcing site Indiegogo. Read More


WHITE PAPER: CA Technologies

Reduce Data Protection Complexity
Choosing the right data protection solution should not add to the complexity and challenges of meeting the everyday demands of the business. Data protection can be simple to deploy, use and fit into IT's budget, but more importantly make systems, applications and data available 24/7. Learn More

Why this Linux user is now using Windows 3.1
Before we begin, let me just say that what you are about to read is, for lack of a better word, ridiculous. I know it is ridiculous. It is almost boundless in its ridiculousness. But I am going to write these words anyway. This is the story of how a Linux user...switched to Windows 3.1. At least in part. You read that right. Windows 3.1. Yes. That Windows 3.1. The 16-bit one that came out in 1992...over... Read More

Software-defined networking is more than just programmability
With the hype around software-defined networks (SDNs) having grown as high as it has, almost every vendor is looking for an angle to capitalize on the opportunity. I've noticed recently that many of the vendors, particularly the big-box vendors, are focused on the concept of "network programmability." While I agree that programmability is a component of SDN, it shouldn't be the sole focus of the... Read More

National Cyber Security Alliance panel of privacy chiefs kicked off Data Privacy Day
Data Privacy Day is great since it highlights both privacy and security. They used to easily be within the same category, but now are often at odds. The National Cyber Security Alliance (NCSA) kicked off Data Privacy Day 2013 with an event at the George Washington University Law School in Washington, D.C. that was streamed live on Facebook without requiring login. Read More

Products of the week 1.28.13
Our roundup of intriguing new products from companies such as Fortinet and GFI Read More

 
 
 

SLIDESHOWS

Microsoft Office Web Apps v. Google Docs
5 reasons why Google Docs is better/5 reasons why Web Apps is better.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Press, bloggers fall for iPhone cup holder 'joke'
  2. New server can be parachuted into extreme environments
  3. Weird and wonderful high-tech inventions of the world
  4. Samsung Galaxy S 4 buzz still white-hot
  5. A coffee-drinking iPhone owner's pipe dream
  6. Backdoor accounts found in networking and security appliances from Barracuda Networks
  7. Ex-Cisco engineers tackle Layer 4-7 SDNs
  8. Microsoft can 'start printing money' as soon as it launches Office for iOS
  9. Anonymous hits U.S. government site, threatens release of secrets
  10. Symantec CEO on reorg: "our system is just broken"
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment