Search This Blog

Thursday, October 22, 2009

A wireless mouse you can practically use anywhere

Powermat: Charging without cords - magic and magnets!; Nokia cell phone torture chamber
Network World logo

Cool Tools Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by HP
rule

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.

Learn more

rule

Spotlight Story
A wireless mouse you can practically use anywhere

This is a portable mouse that includes Microsoft's BlueTrack technology, which combines optical and laser technologies to let you use the mouse on more surfaces, including carpet, granite and wood. Read full story

Related News:

Powermat: Charging without cords - magic and magnets!
The Powermat is a system of three connected square blocks that can recharge your portable gadgets, such as an iPhone, iPod, BlackBerry, Nintendo DSI or DSI Lite, and even cell phones.

Nokia cell phone torture chamber
At one of the company's test labs, Nokia gave a glimpse of how it tests each new model before putting it on the market.

Panasonic's Robot Plans
The company wants to make robotics into a major business and has demonstrated its latest research.

Google Trike maps non-road areas
The peddle-powered tricycle allows Google to photograph and catalog popular landmarks that are only accessible by foot.

Making lithium-ion batteries safer
A new material developed by Taiwanese researchers aims to put an end to fires and explosions caused by the lithium-ion batteries commonly found in phones and other mobile devices.

Wi-Fi Everywhere! New specs and locations
Keith Shaw speaks with Kelly Davis-Felner from the Wi-Fi Alliance about the new Wi-Fi Direct specification (peer-to-peer connections), enterprise support for 802.11n and how people on airplanes are responding to Wi-Fi availability. (16:58)

Managing the Smartphone Explosion
The influx of new smartphone platforms means that IT more than ever needs to find ways to manage applications, security and costs of these mobile devices. Keith Shaw chats with Ahmed Datoo from Zenprise about the latest trends (a move away from company-owned devices?) and best practices for an enterprise mobile device strategy. (14:28)

Biometrics Gain Public Acceptance
As public concern continues to grow around personal information security and safety, there's also growing acceptance of biometrics technologies to help verify identity to prevent fraud. Keith Shaw talks with Mark Cohn from Unisys about these issues raised by the latest Unisys Security Index survey results. (19:07)

Typewriters and fax machines for everyone!
Keith and guest co-host Denise Dubie gab about the Danger/T-Mobile debacle, get ready for their Windows 7 deployments, and debate whether they could live without the Web. (34:58)

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.
Register now.


Why SOA-based Date Services?
Data. It's your organization's most proprietary asset. Whether it's in traditional IT systems or in the internet cloud, the ability to get to it, trust it, and use it to drive effective actions is your competitive advantage.
Register for the launch of Informatica 9 today.

 

October 22, 2009

MOST-READ STORIES

  1. IBM takes aim at Windows 7 with new desktop offering
  2. The top 7 roadkill victims on the journey to Windows 7
  3. Reports: Google to launch music service and phone
  4. Goodbye steering wheel, here comes drive-by-joystick
  5. Verizon fires shots across iPhone's bow with Droid smartphone
  6. Deck out your home office
  7. Facebook for scientists gets millions in funding
  8. Cisco unveils new generation of branch routers
  9. What the heck are you doing on the Internet at that hour?
  10. Ballmer takes on SharePoint future, software licensing issues, Sidekick woes

How to Improve NOC Efficiencies
Network managers are grappling with data center consolidation, expanding networks and shrinking change windows, network compliance and security issues, VoIP, and flat headcounts. Managing the network is getting more and more challenging. What's needed is a lifecycle approach based on an integrated tool set. This video shows a solution to those complexity challenges.
View Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: