Search This Blog

Wednesday, March 27, 2013

Deep inside Windows Blue: 10 coolest features in Microsoft's leaked OS

  Microsoft's relationship with Samsung gets ugly | Juniper losing its enterprise mojo
 
  Network World Network/Systems Management

Forward this to a Friend >>>


Deep inside Windows Blue: 10 coolest features in Microsoft's leaked OS
After an abundance of rumors, whispers, and slip-ups in job postings, we now have more concrete evidence of Microsoft's secretive Windows Blue operating system: An honest-to-goodness leak of an early build of the OS. Read More


WHITE PAPER: IBM Corporation

Microsoft Dynamics AX solutions from IBM
IBM provides consulting, implementation and application management services for Microsoft Dynamics AX, a comprehensive ERP solution for midsize and larger organizations that empowers people to work effectively, manage change, and compete globally. Learn More.

WHITE PAPER: Salesforce.com

Escape Lotus Notes
With the Salesforce Platform, you can develop and deploy mobile, secure, scalable apps faster than ever. You'll get real-time reporting, visual work-flow, and with automatic feature upgrades, your apps will always have the latest innovations. Read Now!

Microsoft's relationship with Samsung gets ugly
A while back I commented on the rumor that Samsung was trying to torpedo Windows Phone and harm Microsoft. The idea struck me as ludicrous, not to mention potentially dangerous. Well, it doesn't appear Samsung has to do anything behind the scenes. The war of words is now coming out in public. Read More

Juniper losing its enterprise mojo
It looks like Juniper's nine-year foray into the enterprise wilderness has lost its way. Perhaps Scott Kriens should have heeded his own wisdom about not competing with his customers. Read More

Dirty smartphones: Devices keep traces of files sent to the cloud
When smartphone users upload files to cloud-based services, remnants of those files often remain on their handheld device, even if the data is meant to be stored only in the cloud, researchers have found. Read More


WHITE PAPER: F5

2012 Magic Quadrant for Application Delivery Controllers
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more advanced features, such as user and traffic control and monitoring. This report provides insights into vendors' strengths and weaknesses. Read More.

Cell system used in Antarctica may help to cover the Plains
Rural residents in North America may soon get a shot at better cellular coverage with an open-source technology being used in Antarctica, Mexico and Papua, Indonesia. Read More

Touch and go: 11 new Windows 8 input devices tested
While there's a lot more going on under hood, touch control is the singular Windows 8 feature that fundamentally changes how you interact with your notebook, tablet, or desktop PC. Read More

Big Switch says 'thin' virtual switch will lower costs, spur OpenFlow adoption
In an effort to accelerate the adoption of OpenFlow for software-defined networking, Big Switch Networks this week unveiled an open source-based "thin" virtual switch for servers and commodity switches. Read More


WHITE PAPER: Wildpackets

The State of 802.11 Briefing
802.11ac hardware is now a reality. Vendors are talking about 802.11ad. Gigabit and Multi-Gigibit Wi-Fi - as well as applications such as VoIP over Wi-fi (VoFi) that need them - are closer than ever. Understand the differences between 802.11n/ac/ad and get ready today for changes to your wireless infrastructure. Download this ebook

3D virtual worlds for the enterprise
The first step is browser-based environments for online meetings. Read More

Silver Peak announces virtual appliance for offsite replication
Silver Peak Systems announced a new virtual application designed to dramatically speed up data duplication for disaster recovery without the purchase of additional hardware. Read More

Pirated software a shortcut to malware and worse, says IDC report
Consumers and businesses that choose to use pirated software are running an extremely high risk of malware infection while searching for and downloading it, a new IDC report on behalf of Microsoft has claimed. Read More

Malware-detecting 'sandboxing' technology no silver bullet
The security technology called "sandboxing" aims at detecting malware code by subjecting it to run in a computer-based system of one type of another to analyze it for behavior and traits indicative of malware. Sandboxing -- one alternative to traditional signature-based malware defense -- is seen as a way to spot zero-day malware and stealthy attacks in particular. While this technique often effective, it's hardly foolproof, warns a security researcher who helped establish the sandboxing technology used by startup Lastline. Read More

 
 
 

SLIDESHOWS

Best tools for social media analytics

How to tell if your Facebook, Twitter and LinkedIn efforts are paying off.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Yahoo buys teen's startup for $30M, hires him .. and what?

2. New Juniper SDN device portends forklift upgrades for core Ethernet switch

3. Deep inside Windows Blue: 10 coolest features in Microsoft's leaked OS

9. 10 tech products to boost your small business productivity

5. Have an older PC? Try the new Ubuntu Linux-based LXLE

6. Kali Linux: The Next BackTrack

7. iPhone 6 rumor rollup for the week ending March 15

8. Hackers steal photo, turn Wi-Fi camera into remote surveillance device

10. Juniper to unveil programmable core switch for software-defined networking

4. Progress report: Building and managing the 21st century data center

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: