---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: May 20, 2013 2:01 PM
Subject: Google Glass competitors: 6 alternatives
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News PM | | Bring on the Google Glass competitors. Companies scramble to be the first to market. | | Issue highlights 1. Factors converging to drive 10G 2. Yahoo on Tumblr: We won't 'screw it up' 3. Why Apple is still struggling to strike a deal with record labels over its rumored iRadio service 4. Lawyer questions legal ethics of LinkedIn endorsements 5. Yahoo Japan says 22 million user IDs may have been stolen 6. Canadian Tire forgoes BYOD, issues BlackBerries to workers 7. Shrinking chips challenge Moore's Law 8. Microsoft's $300M Nook investment hasn't paid off -- yet 9. 15 government PSAs that would never fly in the Internet age 10. The first video ever uploaded to YouTube | RESOURCE COMPLIMENTS OF: VMware Innovation Awards Have you and your team completed a project that had a positive impact on your company or industry? Was it a project that helped to transform the experience for employees or customers? Did you and your team complete the project despite internal and external challenges? Have you leveraged VMware's technology? Click to continue | The market for 10G Ethernet is poised for strong growth due to a number of factors, according to Crehan Research. Those factors include: READ MORE | Yahoo has confirmed widespread reports that it will acquire the popular blogging service Tumblr, and also promised not to "screw it up." The deal is worth about US$1.1 billion, nearly all in cash. READ MORE | Rumors of Apple's iRadio service have persisted for quite some time. With WWDC steadily approaching -- and slated to begin in June -- all eyes will be on Apple to see what type of new music service, if any, it will have to preview. A few weeks ago we reported that Apple was still in negotiations with the four largest US music labels to secure licensing agreements. To date, Apple has reportedly only... READ MORE | WHITE PAPER: Tripwire Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More | While many of the rest of us simply question the worth of LinkedIn "endorsements," lawyer/blogger Robert Ambrogi is asking whether indiscriminate use of the feature violates legal ethics ... and he's not the first to do so. Amrbrogi writes on his LawSites blog: READ MORE | Yahoo Japan, the country's largest Web portal, said up to 22 million user IDs may have been leaked during a hack that was discovered last week. READ MORE | Canadian Tire began issuing thousands of BlackBerry Q10 smartphones to corporate employees in Toronto after rolling out Z10 models weeks earlier. READ MORE | WHITE PAPER: IBM Corporation This new white paper from IBM, showcases five organizations that are strategically integrating emerging social software and tools with their existing investments and seeing measurable results in return on investment. Learn More | Intel will continue to fulfill Moore's Law for the foreseeable future, but the challenge of keeping up with it is growing as chips get smaller, says a company executive. READ MORE | Microsoft has gotten next to nothing from its $300 million investment in Barnes & Noble, analysts said, but it may reap some rewards as it prepares to ship smaller tablets. READ MORE | READ MORE | On February 14, 2005, Chad Hurly, Steve Chen, and Jawed Karim purchased a domain name that would forever change the way media is disseminated and consumed. You see, a little over 8 years ago is when the aforementioned individuals got together and purchased the YouTube.com domain. READ MORE | WHITE PAPER: F5 Networks Persistent Threat Management is a new operational model that takes advantage of integration and automation capabilities between vulnerability scanning services and web application firewalls. This paper looks at the application of the model in protecting web applications against exploitation. Read Now | | | | | | | | |
No comments:
Post a Comment