Thursday, August 07, 2014

Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward

OneDrive Continues Microsoft Migration to Amazon Mobile Devices | Judge rules against Microsoft in email privacy case

Network World Microsoft

Forward this to a Friend >>>


Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward
It's no secret that Windows Phone is not setting the world on fire, despite all the noise we keep hearing from Samsung and other non-Apple vendors that they want an alternative. Read More


WHITE PAPER: Dell Software

The Importance of Managing Privileged Accounts
In this Windows IT Pro white paper sponsored by Quest Software, gain understanding into the dangers and benefits of privileged account management, and how enabling granular access control and accountability helps mitigate management risk. Read Now!

WHITE PAPER: Citrix Systems

Top 5 must-haves to update your WAN optimization solution
Read this paper to learn more how WAN optimization offerings need to evolve to provide coverage for these and other business-driven IT trends and initiatives. Read Now

OneDrive Continues Microsoft Migration to Amazon Mobile Devices
Microsoft moves its OneDrive cloud storage service to Amazon's Kindle Fire phones and tablets. Read More

Judge rules against Microsoft in email privacy case
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland. Read More


WHITE PAPER: Delphix

Allay Risks in Application Rationalization and Modernization
IT has to do it all: react quickly to market needs, introduce new services, capitalize on mobile, and comply with regulatory requirements, all without raising costs and complexity. Delphix has the platform to enable IT teams to navigate their business past the risks, saving money and time. Learn more!

Glaser returns to head RealNetworks, vows to be 'video cloud' leader
The ex-CEO who returned as interim CEO has been made permanent. This sounds familiar. Can history repeat? Read More

Microsoft's Windows Phone 8.1 update takes Cortana to China, UK, and three other countries
Microsoft's voice-activated digital assistant Cortana is coming to China in a beta version nicknamed "Xiao Na," as part of several new functions packed into a Windows Phone 8.1 update. Read More


WHITE PAPER: Dell Software

Access Management (IAM) for Unix-based Systems
Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency. Read now!

Symantec patches privilege escalation flaws in Endpoint Protection
Exploit code for the flaws was released Tuesday Read More

HP to test wearables market by working with partners
HP will provide the engineering and technology for wearables designed by fashion houses and partners Read More

Lawsuit against NetSuite over 'manifestly unusable' software set to be dismissed
It's far more preferable to avoid going to court altogether when you've got a problem with your vendor, one analyst says Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Rackspace bows out of IaaS market

2. Why TCP/IP is on the way out

3. iPhone 6 will not be delayed by Chinese wheel hub factory explosion

4. Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward

5. Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down

6. 10 things you need to know about Microsoft's Surface Pro 3

7. IT Outsourcing Customers Mad as Hell, Ready to Walk

8. Top 20 colleges for computer science majors, based on earning potential

9. 10 disturbing attacks at Black Hat USA 2014

10. Defining F5's role in software defined networks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment