Search This Blog

Tuesday, February 28, 2012

Windows 8: The most burning questions

IBM scientists discuss quantum computing breakthrough | Quick look: Silicon Valley's wicked young CEOs

Network World Daily News AM

Forward this to a Friend >>>


Windows 8: The most burning questions
When Windows 8 Consumer Preview is available Wednesday it should answer questions that the earlier developers preview didn't. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry Mobile Fusion
Now all personal and corporate-owned BlackBerry® smartphone and BlackBerry® PlayBook™ devices can seamlessly access business data and applications on a single, secure management platform. Soon, Apple® iOS and Google® Android™ devices will be able to do the same. Learn how this new approach will end mobile chaos at blackberry.com/mobilefusion

In this Issue


RESOURCE COMPLIMENTS OF: Evault

"Got Your Backup. Recovery. And Back."
"Looking for an ultra-reliable, proactive partner? One who's passionate about keeping your critical data safe and available? EVault®, the leader in cloud-connected storage services, always has your back. With on-premise, cloud-based, and seamlessly integrated hybrid solutions. Perfectly optimized for flexible multi-platform, multi-site deployment." Click to continue

IBM scientists discuss quantum computing breakthrough
Technology news outlets are abuzz this morning with a report from IBM that its scientists have made great strides toward to bringing the theories of quantum computing to reality. From a Computerworld story on our site: Scientists at IBM Research today said they have achieved a major advance in quantum computing that will allow engineers to begin work on creating a full-scale quantum computer. Read... Read More

Quick look: Silicon Valley's wicked young CEOs
Silicon Valley youngsters get lots of money for new, innovative Internet companies Read More

Cisco: "We've never been more relevant"
Despite the impressive recovery Cisco made over the last year, there's still room for improvement. Read More

Dell claims it has network virtualization architecture too
Dell this week is throwing its hat into the virtual networking ring with an architecture that initially is long on vision but short on specifics. Read More


WHITE PAPER: Quest Software

Want to Make Compliance Easy? Get Proactive!
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity. Get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs today and tomorrow. Read Now!

Malware authors expand use of domain generation algorithms to evade detection
Malware authors are increasingly adopting flexible domain generation algorithms (DGAs) in order to evade detection and prevent their botnets from being shut down by security researchers or law enforcement agencies. Read More

Trend Micro overhauls threat-detection product, returns it to customer premises
Trend Micro today announced Deep Discovery, a threat-detection tool designed to monitor network traffic in order to detect signs of stealthy attacks aimed at stealing corporate data. Read More

RSA Conference: Symantec inaugurates O3 cloud-based single sign-on service
At the RSA Conference Tuesday, Symantec announced general availability of its O3 cloud-based single sign-on (SSO) and authentication service, which adheres to a concept company CEO Enrique Salem outlined exactly a year ago at RSA 2011. Symantec also provided detail on future capabilities the O3 cloud service will have for data-loss prevention and encryption. Read More

Campaign now for workers to buy Windows 8 on x86 tablets
Windows 8 mobile devices could cause headaches for IT departments if employees start bringing them in expecting to do work with them. Read More


WEBCAST: VMware

Automating Infrastructure and Operations Management
Attend this webcast to learn how the new VMware vCenter™ Operations Management Suite allows IT to: - Dramatically simplify services - Automate service delivery and management View Now!

Thousands of apps won't work on new low-end Windows Phones
Microsoft said it has found 5 percent of Windows Phone apps that won't work on devices that adhere to the new system requirements the company released for low-end phones. Read More

Steve Jobs ignored Warren Buffett's advice for a stock buyback
With over $98 billion in the bank, Apple is certainly not wanting for cash. With each passing quarter, Apple's stockpile of money increases by the billions and is now so large that many investors are clamoring for Apple to do something, anything, with all that cash. Read More

Google puts $1M on the line for Chrome exploit rewards
Google on Monday withdrew as a sponsor of next month's Pwn2Own hacking contest, and will instead put as much as $1 million up for grabs if researchers can exploit Chrome. Read More

MWC2012: Intel CEO Paul Otellini outlines smartphone roadmap
Intel CEO Paul Otellini spoke at Mobile World Congress in Barcelona about how the company plans to cater to both high and low-end devices. Read More

RSA Conference 2012: Stress and burnout in infosec careers
Career stress and burnout is as common among information security professionals as it is among professionals in other high-stress fields, such as medicine or law. But finding support and information on dealing with info sec career burnout is difficult because resources and knowledge are scant. Read More

BlackBerry PlayBook OS 2.0: Four Things IT Needs to Know
RIM this week rolled out a major software update for its BlackBerry PlayBook tablet PC, with new native e-mail and PIM apps, a number of cool new productivity features and corporate server support that's sure to have significant IT implications. CIO.com's Al Sacco details five things IT managers should know about PlayBook OS 2.0. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. IBM's molecular images may help nanoscale circuits
  2. 6 things you need to know about Google's new privacy policy
  3. The crime of selling used video games
  4. Giving up your iPhone
  5. A 1985 gift to Jobs meets 2012 copyright law
  6. Cisco bounces back
  7. iPhone 5 rumor rollup for the week ending Feb. 24
  8. Network operators get serious about Wi-Fi
  9. Cisco buys optical company for $271 million
  10. Cisco Q4 Ethernet switch revenue up, HP's down

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: