Search This Blog

Wednesday, December 18, 2013

What Microsoft did right and wrong in 2013

IBM: Smart machines set to rule the world | 2013 tech news quiz

Network World Network/Systems Management

Forward this to a Friend >>>


What Microsoft did right and wrong in 2013
Nobody bats a thousand, and Microsoft is no different. Here's a quick look at five things Microsoft did right in 2013 and five it did wrong. Read More


WHITE PAPER: Dell

Tech Brief: Exchange 2013 Data Loss Prevention
Protecting your company's critical data is a critical, mandatory part of an Exchange administrator's tasks. In this white paper, learn about the data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Read now!

WEBCAST: IBM

Unleash Your Data With SDS And IBM Storwize V5000
In this webcast IBM examines software defined storage and how IBM Storwize V5000, the newest member of the IBM Storwize family, delivers virtualized, flexible, easy-to-use storage that enables midsized organizations to gain business advantage from the flood of new data while staying within their budgets. View Now

IBM: Smart machines set to rule the world
IBM today took the wraps off of its eight annual "IBM 5 in 5" appraisal of the key technologies that could change high-tech life in the coming five years. Perhaps not surprisingly Big Blue this year says future tech developments will revolve around cognitive or smart learning systems that will learn, reason and involve human interaction like never before. Read More

2013 tech news quiz
Snowden, Ballmer, 3D handguns, iPhone 5s – this year had it all. Read More

IT security chiefs can make big bucks but are they happy?
The top IT security chiefs make salaries that can run over $1 million per year, but are they happy? Ponemon Institute, which interviewed about 700 security professionals in the top IT security spot at their companies to find out, learned they make big bucks but the job often feels stressful and isolated. Read More


WEBCAST: Novell

Putting Mobile Employees to Work
Mobile Employees in the workplace. Watch this webcast. Click Here>> Learn More>>

Amazon wants to analyze real-time data with Kinesis
Amazon Web Services hopes enterprises are willing to rely on the company when getting large amounts of data ready for analysis with its latest service, Kinesis. Read More

Notable deaths of 2013 from the worlds of technology, science & inventions
In memoriam: Computing pioneers with roots at Apple and IBM pass, as do brilliant young Internet innovators. Read More

How to trace a stolen MacBook: use Find My Mac to find stolen MacBook
Your precious Apple laptop has been stolen, and you are bereft and angry. But all may not be lost. If you have Find My Mac enabled on your MacBook you can track it, lock it, and even message the oxygen waster who lifted your laptop. Here's how to trace a stolen MacBook. Read More


WHITE PAPER: AT&T

Four Keys to Choosing a Holistic Mobile Management Solution
Getting peak value from mobile technologies takes a wide range of applications and services. Here are four capabilities every end-to-end mobile management solution must include. Learn More

University of Florida gets 100Gbps link to Internet2, upgrades campus research net to 200Gbps
The University of Florida is just putting the wraps on a remarkable year of IT upgrades. The school, which has a 2,000-acre campus and more than 900 buildings, installed a new supercomputer in a new data center, installed a 100Gbps link to Inernet2, and upgraded its Campus Research Network from 20G to 200Gbps while adding support for Software Defined Networking (SDN). Network World Editor in Chief John Dix got the lowdown on all of the developments from Erik Deumens, director of research computing. Read More

28-year old man in Sweden fined $652,000 for movie piracy
A noted movie pirate in Sweden was recently fined $652,000 for uploading a movie to a BitTorrent site. The amount was calculated by determining the equivalent amount the movie studio who owned the movie would have charged in licensing fees to distribute the movie for free. In addition to a fine, the pirate was sentenced to 160 hours of community service along with a suspended jail sentence. Read More

10 Cloud Computing Predictions for 2014
Cloud computing is increasingly becoming the rule and not the exception for application deployment. This will make 2014 an interesting and disruptive year for vendors, service providers and IT organizations grappling with this change. Read More

Report: Salesforce.com joining OpenStack
Salesforce.com, the preeminent software as a service (SaaS) company, is reportedly joining the open source OpenStack project. Read More


SLIDESHOWS

Avaya builds massive Wi-Fi net for 2014 Winter Olympics

BYOD for 30,000 people creates extraordinary demands on the network.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Report accuses BT of supplying backdoors for GCHQ and NSA

2. Avaya builds massive Wi-Fi net for 2014 Winter Olympics

3. First Look: Gigabit Wi-Fi adapters

4. Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards

5. Juniper buys net optimizer WANDL for $60M

6. 2013: The 12 months of Cisco

7. Inside Dropbox's plans for enterprise domination

8. 2013 computer crime blotter

9. Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware

10. Advanced persistent threats now hitting mobile devices


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: