Thursday, January 29, 2015

Rooting your Android device: A guide for the accident-prone

  Rapid Review: Dell's slick new Venue tablet | What is home automation and how do I get started?

 
  Network World Cool Tools  

Rooting your Android device: A guide for the accident-prone
I am the person IT people are talking about when they say "he knows just enough to be dangerous." I can't deny it. I've broken many more computers and phones and other gadgets through attempts at tinkering than I've improved.Even here at Network World, I managed to completely bork my work laptop's Windows install and lose a bunch of data while trying to adjust my disk partitions for dual boot. (OK, the IT folks just re-imaged it and made fun of me a little, but still.)+ ALSO ON NETWORK WORLD: 10 tips to secure your iPhone | Windows 10: The best tips, tricks, and tweaks +To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: PC Connection | EMC

XtremIO – Make an Informed Flash Decision
What does better storage mean for your business? How do you hope to improve your storage efficiency? What form do you expect IT innovation to take in your organization? Learn More

WHITE PAPER: IBM

Data and Storage Reduction: Some Existing Options
Spending the same amount to store all types and pieces of data—or even to keep any data which has no positive value to an organization—is a suboptimal approach from many perspectives. Read more to learn how to store and spend less on data. Learn More.

Rapid Review: Dell's slick new Venue tablet
Rapid Review: Dell Venue 8 7000 The Dell Venue 8 7000—or Venue 8 7840, if that's what you want to call it—is a pretty solid choice for an Android tablet. From: Network World Views: 0 0 ratings Time: 01:45 More in Science & Technology Read More
 

What is home automation and how do I get started?
From flicking a light switch to opening your garage door with a remote control, our homes have been automated for decades. The concept goes as far back as the 1934 World's Fair in Chicago where the "home of the future" was unveiled. In the last 80 years, however, the automated home has morphed into the smart home, courtesy of the Internet, sensors and connectivity. The modern automated home can do more than turn on our heating and our lights—it can actually think for us.In this guide, we'll explain what smart home automation is, how it can help you, and explore the latest and greatest technologies, products and services in the Home Automation field.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: IBM

Advanced Case Management Leadership Guide
A guide that examines how IBM Case Manager offers an extensible platform for enhancing capabilities and protecting investments with additional value-added ECM capabilities from IBM, as well as industry-specific case management applications and best practices from IBM Business Partners. Read Now

What can I do with home automation?
Once reserved primarily for the wealthy due to its complexity and whole-home-or-nothing model, today home automation is more accessible, no matter what your budget. Instead of buying into a $50,000 whole-home system, you can build a smart home yourself piece-by-piece. In this article, we will run through the major areas of home automation and explore what different devices and systems can do, helping you decide what works best for your needs.  (Click here for Part 1 of this series.) The opportunity to keep your home safe and secure with accessible gadgets and no high monthly fees has been a driving factor in the rapid growth of the smart home. Smart home security systems are simple and inexpensive, making this a great entry point into the smart home ecosystem. Here are some of the key elements:To read this article in full or to leave a comment, please click here Read More
 

10 tips to secure your iPhone
iPhone securityImage by KelvinsongHere, we provide some very straightforward but effective ways you can secure your iPhone, and help ensure that your private data stays available and secure.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: iDashboards
 
Georgia Institution Stretches Budget with iDashboards
Dalton State College needed a dashboard solution that would assist them in summarizing, presenting and monitoring higher education metrics. They were able to efficiently convert their Fact Book, which usually took six weeks to finish, into dashboards to make more informed, timely decisions. Learn More

Apple Watch Starts Shipping in April, Tim Cook Confirms
We knew it was coming sometime this spring, but now we have a more narrow timeframe: Apple Watch starts shipping in April, Tim Cook said. So it's not an exact date, but we're getting closer. Cook dropped the news on Apple's quarterly earnings call Tuesday afternoon, saying Apple Watch is "on schedule" and will ship in April. The company reportedly hasn't publicly committed to a date because Cook and co. are still working on the device's battery life. According to a recent 9to5Mac scoop, Apple is aiming for 19 hours of mixed active and passive use, but isn't sure it can nail that goal for the first generation of Apple Watches.To read this article in full or to leave a comment, please click here Read More
 

New Vivaldi Browser Aims to Win Over Power Users
There's a new browser aiming to win the hearts and minds of power users. Called Vivaldi, the Chromium-based browser comes from a team led by Jon von Tetzchner, co-founder and former CEO of Opera Software. Vivaldi is available now as a technical preview for Windows, Mac, and Linux. The overall look of Vivaldi is a mix of a classic browser UI and the more sparse, modern interpretations in browsers like Chrome and Microsoft's upcoming Spartan. In the upper left corner, you have a small menu button; below that the address bar with home, back, forward and refresh buttons to its left. There is also a left sidebar for quick access to browser features such as bookmarks, contacts, downloads, and notes. At the very bottom of the sidebar is a settings icon for quick access to your browser's preferences.To read this article in full or to leave a comment, please click here Read More
 

Can drones hunt with wolf pack-like success? DARPA thinks so
The Defense Advanced Research Projects Agency is set to detail a program the agency wants to come up with software and algorithms that would let unmanned military aircraft hunt in packs like wolves. The Collaborative Operations in Denied Environment or CODE program looks to extend unmanned aircraft mission capabilities well beyond the current state-of-the-art, by creating a modular software architecture that is resilient to bandwidth limitations and communications disruptions, yet compatible with existing standards and capable of affordable retrofit into existing platforms and in the end letting groups of unmanned systems work together under a single human commander's supervision, DARPA stated.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Cooler than cubicles: 18 new designs for the office

Sit, stand, lean, curl up – today's commercial furniture designs let users choose how they want to work.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES

1. FCC calls blocking of personal Wi-Fi hotspots "disturbing trend"

2. Super Bowl XLIX's techiest commercials

3. Cisco brings Meraki to the enterprise

4. Oracle is quietly becoming a cloud giant

5. Our bullet-proof LAN failed. Here's what we learned

6. Peeping into 73,000 unsecured security cameras thanks to default passwords

7. A new kind of DDoS threat: The "Nonsense Name" attack

8. Is the ASUS X205 Microsoft's Chromebook killer?

9. Cisco's evolving software, cloud strategy will hinge on hardware

10. Windows 10: The best tips, tricks, and tweaks


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment