Issue highlights 1. Holiday gift guide 2013: Gadgets for work, play 2. Gift Guide 2013: Work gadgets 3. HP: 90% of Apple iOS mobile apps show security vulnerabilities 4. 10 reasons the browser is becoming the universal OS 5. Geek-themed Meme of the Week: Vertical Video Edition 6. Geek-Themed Meme of the Week Archive 7. Guess how many people will be at Salesforce's Dreamforce show this week 8. The security industry remains strong with computer science, but weak on IT 9. Google to warn users of 13,000 search terms associated with child pornography 10. IBM looks past Watson, taps graphics chips to speed Power servers 11. CIOs and CMOs: Feuding in the C-Suite 12. Products of the week 11.18.13 13. Dell PowerEdge VRTX hits the high notes |
RESOURCE COMPLIMENTS OF: SolarWinds Networks can grow fast—really fast. This rapid growth leads to increased network traffic, more endpoints, and new IPs consuming bandwidth. Key to a complete understanding of network behavior at your growing organization is the ability to collect and analyze NetFlow data in your routers. SolarWinds new video shows you how, in less than 5 minutes! Looking to enable Flexible NetFlow on your Cisco routers? In less than 5 minutes, SolarWinds lead Sales Engineer demonstrates how to enable NetFlow v9 on Cisco routers with custom flow records. Watch the short how to video now! |
The holidays are here, and it's time to rock! With more than 140 products to choose from, let us take you on a journey through our favorite personal technology products and gift ideas for the techie on your list. From phones to computers to the hottest video games, we've got a bunch of great gift ideas. Please peruse and share with friends and family! READ MORE |
The merging world of personal technology and workplace technology is always a fascinating scene to observe, so a lot of devices here can be utilized at home, and vice versa (see our Digital Life article for home-related tech gift ideas). But for the most part, we're confident that your work life will improve with these gadgets - peruse the writeups for gift ideas for your favorite colleague! READ MORE |
HP today said security testing it conducted on more than 2,000 Apple iOS mobile apps developed for commercial use by some 600 large companies in 50 countries showed that nine out of 10 had serious vulnerabilities. READ MORE |
A bazillion years ago in Internet time (aka 1995), Brendan Eich, Marc Andreessen, and the rest of Netscape looked at the World Wide Web and saw a sparsely tagged world of static documents -- a computational desert where a programmer's seed could find no purchase. READ MORE |
WEBCAST: Silver Peak Systems, Inc. Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >> |
No. 22 in our Geek-Themed Meme of the Week series addresses a common issue that has plagued many a cell-phone videographer. Want more? Check out the "Geek-themed Meme of the Week Archive": And if you'd like me to consider one that you've found - or created - please feel free to send it to me at buzz@nww.com. READ MORE |
They are inescapable on the Internet. Most are awful. A few are not, so we have started publishing a selection of memes that amuse me. One every week. Here's the archive. READ MORE |
Vendor-sponsored tech conferences are becoming big deals, just check out Salesforce.com's Dreamforce event. If Salesforce was expecting to attract 80,000 or 90,000 like it did last year that would be impressive. 100,000 would be a pretty big show and bigger than any show from Salesforce, or anyone else, in recent memory. READ MORE |
Last week, I was in Silicon Valley meeting with a parade of CISOs and security vendors. Business travel is no "day at the beach," but these trips really help me keep up with the latest enterprise security challenges and potential technology solutions. It was also nice to spend time in the Valley and re-charge my batteries toward the security industry. There was a lot of excitement out there as... READ MORE |
WHITE PAPER: CDW This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now |
Google will display warnings above the search results for 13,000 terms it believes are associated with more explicit child sexual abuse terms, it announced Monday. Microsoft said it will take similar action on its Bing search engine, and on Yahoo searches powered by Bing. READ MORE |
IBM achieved a computing breakthrough when the Watson supercomputer outperformed humans in game show "Jeopardy," but the company now wants to supercharge its high-end Power servers by tapping into graphics processors for the first time. READ MORE |
Survey finds that CIOs and marketing chiefs don't see eye-to-eye on much at all. READ MORE |
Our roundup of intriguing new products from companies such as Extreme and CloudLock READ MORE |
Dell's four-blade, 32-drive, 'cluster in a box' packs high performance, high availability, and high-end management in a tidy package READ MORE |
WEBCAST: IBM View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More. |
|
No comments:
Post a Comment