Issue highlights
|
| RESOURCE COMPLIMENTS OF: AT&T
|
With
the Inside 3D Printing conference kicking off this week, what better
time than now to recap what has been the most eventful year for 3D
printing technology so far. This
READ MORE
|
With
real information about iPad 5 and iPad mini 2 almost non-existent, the
iOSsphere seized on the dregs, most of them provided by anonymous Asian
supply chain sources.
READ MORE
|
Tablets
and smartphones, which employees are bringing into work in “Bring Your
Own Device” (BYOD) style, are leading IT managers to ask security
questions, starting with whether they should sort out corporate mobile
apps and data from personal ones. It’s all encouraged a spate of
security start-ups to come up with their own answers, and highlighted
here are a few that have recently hung out a shingle for mobile
security. But it’s not just mobile spurring the creation of young
security firms out to change the world.
READ MORE
|
RESOURCE COMPLIMENTS OF: Cisco
Knowing is half the battle. And there are many technical challenges for
virtualized network environments on the way to cloud-readiness. Gary
Kinghorn, Senior Solution Marketing Manager at Cisco, and Bob Laliberte,
Senior Analyst at the Enterprise Strategy Group (ESG), discuss these
obstacles in this informative webinar.
Learn how Cisco Nexus 1000V helps
|
Call
for U.S. government workers to avoid security conference rankles some
cyber warriors, gets cheers from others
READ MORE
|
The
U.S. Navy's X-47B drone made an autonomous landing on an aircraft
carrier and Boston Dynamics' Atlas builds on its predecessors. Follow
reporter Nick Barber on Twitter @nickjb
READ MORE
|
Is
proprietary software inherently more secure? Or is it the other way
around. Security experts weigh in.
READ MORE
|
WHITE PAPER: Cisco Systems
Nearly everything in data centers is changing, from cabling and network
design, to more sophisticated, faster compact builds. Network security
has to adapt, and IT must drive new security approaches--installing
technologies and policies that can protect today’s and tomorrow’s data
centers.
Read more >>
|
A
global survey of 811 technology business leaders by KPMG gives the U.S.
an edge in what may be a mercurial index that rises and falls with the
overall economy.
READ MORE
|
Normally companies should proceed at their own pace when deploying
Microsoft's monthly updates, known as Patch Tuesday, since they come out on the second Tuesday
of every month. This month's batch, though, is pretty hefty in terms of
impact and volume, so you may want to make them a priority. This
month’s Patch Tuesday
consists of seven bulletins addressing a total of 34 vulnerabilities,
and half...
READ MORE
|
The
attackers did not exploit any vulnerabilities, but they opened up
accounts and used the services as their infrastructure
READ MORE
|
Low-cost Chromebooks are doing very well with retailers, in stores and
online, and now make up a significant share of the low end market, said
market research firm NPD Group.
READ MORE
|
At
Microsoft periodic reshufflings of the players and the executive
hierarchy are a way of life.
READ MORE
|
WEBCAST: IBM
Learn how sales, finance, marketing, procurement, and supply chain
leaders are leveraging SaaS to become more agile and serve the customer
better.
Learn More.
|
|
SLIDESHOWS
Names you'll want to know in the free software/open-source world.
JOIN THE NETWORK WORLD COMMUNITIES
As
network pros you understand that the value of connections increase as
the number of connections increase, the so called network effect, and no
where is this more evident than in professional relationships. Join
Network World’s LinkedIn and Facebook communities to share ideas, post
questions, see what your peers are working on and scout out job
applicants (or maybe find your next opportunity).
MOST-READ STORIES
|
|
No comments:
Post a Comment