Search This Blog

Thursday, January 31, 2013

Office 365 vs. Office 2013: Should you rent or own?

The 12 techiest Super Bowl ads of all time

RSA offers Security Analytics as tool for detecting threats

Network World Daily News AM
January 31, 2013
Share this email

Office 365 vs. Office 2013: Should you rent or own?

For the first time Microsoft is tempting Office users to rent, not own, software that for decades they've bought as a standalone program. It's not a foreign proposition. We pay annual subscription fees for our anti-virus software. Last April, Adobe rolled out its Creative Cloud subscription package for renting Photoshop, Illustrator, and Dreamweaver.

READ MORE
 

Issue highlights

1. The 12 techiest Super Bowl ads of all time

2. RSA offers Security Analytics as tool for detecting threats

3. New specifications to ease delivery of carrier Ethernet services

4. Opinion: Re-invented BlackBerry reaches for "hyperconnected" users

5. INSIDER BaaS: It's a crowded (and young) market

6. Exploiting Universal Plug-n-Play protocol, insecure security cameras & network printers

7. CES2013: Stern Pinball brings pinball machines to the home market

8. Windows 8 convertibles help Lenovo break into high-end PC market

9. Kaspersky Lab adds mobile and system management to its business security offering

10. BlackBerry 10: Predictive typing and easy movie making

11. First Look: BlackBerry 10 smartphones

RESOURCE COMPLIMENTS OF: Google

Google Apps for Business

Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

The 12 techiest Super Bowl ads of all time

The Super Bowl is the time for football, and commercials – increasingly geeky ones. READ MORE

RSA offers Security Analytics as tool for detecting threats

RSA, the security division of EMC, today announced Security Analytics, its tool for real-time analysis of large amounts of data from security and business information to determine if an organization is being attacked, especially by stealthy threats intent on stealing sensitive information. READ MORE

RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

Final Day to Register! BYOD & Mobility Management

Attend and learn how to use your organization's appetite for risk as the foundation of your enterprise mobility management policy. BYOD & Mobility Management Tech Seminar. 2/12 - Westin Hotel, Long Beach, CA Click to continue

New specifications to ease delivery of carrier Ethernet services

Service providers will be able to launch Ethernet services more quickly and make them work across other carriers more easily with a new set of standards for carrier Ethernet equipment, backers of the specifications say. READ MORE

WHITE PAPER: CA Technologies

Reduce Data Protection Complexity

Choosing the right data protection solution should not add to the complexity and challenges of meeting the everyday demands of the business. Data protection can be simple to deploy, use and fit into IT's budget, but more importantly make systems, applications and data available 24/7. Learn More

Opinion: Re-invented BlackBerry reaches for "hyperconnected" users

In a keynote that was rife with technopop music and contrived videos -- and woefully short on details -- Research in Motion launched two new smartphones in its bid to restore its fortunes in the smartphone market. READ MORE

WHITE PAPER: Exceed Group

Fortune 500 optimized mobile plan to save 28%

Exceed Group helped a global manufacturing company implement a complete wireless expense management solutions with Mobil-Eye. Read about what steps they took to reach full optimization of their AT&T and Verizon contracts. Learn how to get your own free Mobil-Eye wireless expenses analysis. Learn More.

INSIDER

BaaS: It's a crowded (and young) market

Back-end as a service offers standard features to drop into your apps, so your developers can spend their time on the most strategic pieces. READ MORE

Exploiting Universal Plug-n-Play protocol, insecure security cameras & network printers

A plethora of vulnerable devices due to the flaws in the Universal Plug and Play protocol put around 50 million at risk; somewhere in the neighborhood of about 58,000 security camera systems are vulnerable to hacking, and exploiting network printers top the list today for potential security mayhem. READ MORE

CES2013: Stern Pinball brings pinball machines to the home market

Computerworld's Sharon Gaudin speaks with Gary Gomez from Stern Pinball at CES 2013. The company was showing off a smaller home version of its full-sized pinball machines, but with complete professional bumpers, lighting and flippers. READ MORE

Windows 8 convertibles help Lenovo break into high-end PC market

Lenovo's CEO said sales of its Windows 8 PCs have been "normal", neither surpassing nor falling behind expectations, but added that convertible devices using the OS are helping the company break into the high-end segment for the North American market. READ MORE

Kaspersky Lab adds mobile and system management to its business security offering

Kaspersky Lab on Wednesday made its bid to reduce the complexity associated with managing IT security processes in corporate environments, with a new product that combines the company's anti-malware technology with new mobile and system management tools. READ MORE

BlackBerry 10: Predictive typing and easy movie making

BlackBerry 10: Predictive typing and easy movie making CIO.com's Al Sacco shows off two of the cooler features of the BlackBerry 10 OS (on the BlackBerry Z10), predictive typing and the Story Maker video editing app. From: networkworld Views: 4 0 ratings Time: 03:16 More in Science & Technology READ MORE

First Look: BlackBerry 10 smartphones

Our initial glimpse at RIM's (er, make that BlackBerry's) attempt to claw its way back into the smartphone market READ MORE

SLIDESHOWS

13 markets you might not associate with Cisco

Cisco's "Internet of Everything" initiative takes it into unchartered territory.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 9 iPhone-iPad apps that invade your privacy, and 1 that doesn't

2. Check Point, Juniper, Stonesoft shine in low-end network firewall test

3. DARPA's unblinking, all-seeing 1.8-gigapixel camera stare on PBS Rise of the Drones

4. Stanford consumes million core supercomputer to spawn supersonic noise forecast

5. Wanted: 40 trillion gigabytes of open storage, stat!

6. Cisco Catalyst marries wired, wireless and SDN in one switch

7. 5 years after major DNS flaw is discovered, few U.S. companies have deployed long-term fix

8. Why this Linux user is now using Windows 3.1

9. FreeNAS: Flexible, fast storage, and the price is right

10. Cisco to buy Czech vendor Cognitive Security for real-time analytics

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: