High-tech

High-tech
Light

Wednesday, January 15, 2014

Microsoft Hyper-V bangs away at VMware's popularity

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 15, 2014 2:39 PM
Subject: Microsoft Hyper-V bangs away at VMware's popularity
To: <aquarianm@gmail.com>
Cc:

Kim Dotcom's wacky antics through the years

10 ways to prep for -- and ace -- a security job interview

Network World Daily News PM
January 15, 2014
Share this email

Microsoft Hyper-V bangs away at VMware's popularity

Cloud management platforms have recently been expanding support for Microsoft's Hyper-V virtualization platform, representing Microsoft's continued efforts to chip away at VMware's dominance in the hypervisor market.

READ MORE
 

Issue highlights

1. Kim Dotcom's wacky antics through the years

2. 10 ways to prep for -- and ace -- a security job interview

3. Hospital exec explains decision to lease hardware

4. These key phrases will help your Kickstarter get funded

5. How to make 96,000lbs of WWII machinery into high-tech research platform

6. New Blackphone promises secure communications and privacy

7. Chrome feature cuts mobile data used by up to half, Google says

8. Try Amazon's cloud for free, using Red Hat tools

9. Six tips for BYOD Security from IBM

10. Net neutrality ruling unlikely to immediately impact broadband market

11. Apple will pay out $32.5M to settle FTC iTunes complaints

12. The 8 Most In-Demand Big Data Roles

WHITE PAPER: SAP

Get Started with SAP HANA ebook

This ebook introduces the SAP HANA in-memory computing platform and describes how it can transform your business. SAP HANA provides standard offerings to help with a range of business issues and can be incorporated into your current infrastructure, with preconfigured software, content and business-user enablement. Learn more

Kim Dotcom's wacky antics through the years

The new leader of a political party, Dotcom is no stranger to controversy. READ MORE

10 ways to prep for -- and ace -- a security job interview

IT security pros with the right skills are in big demand. Last year, the employment rate for information security managers averaged .9%, as we reported in High CISO employment rates means shortage for security industry. That's as close to actual full employment as one can get. READ MORE

Hospital exec explains decision to lease hardware

Last fall, after mulling the buy-vs.-lease question, St. Francis Hospital and Medical Center, based in Hartford, Conn., determined that leasing computers would save it 10% based on a three-year timetable. READ MORE

These key phrases will help your Kickstarter get funded

Words are powerful, particularly on the Internet, and a pair of researchers from Georgia Tech say that they've identified the ones that can either push a Kickstarter campaign over the top or doom it to unsuccessful obscurity. READ MORE

WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager

Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

How to make 96,000lbs of WWII machinery into high-tech research platform

The US Naval Research Laboratory is taking a 96,000-pound piece of World War II-era machinery and turning it into a test-bed for leading edge communications and radar applications. READ MORE

New Blackphone promises secure communications and privacy

Playing on mobile users' fears of commercial and government surveillance, two companies are building a phone they say is designed to protect privacy. The joint venture between smartphone manufacturer Geeksphone and encrypted communications provider Silent Circle will unveil the new device called Blackphone at the Mobile World Congress show in Barcelona next month. READ MORE

Chrome feature cuts mobile data used by up to half, Google says

Google is adding a feature to its Chrome mobile browser that can reduce data usage by up to 50 percent, which could avoid extra data charges from carriers. READ MORE

Try Amazon's cloud for free, using Red Hat tools

Red Hat, which is the largest single contributor to the OpenStack project, is now offering an opportunity to take a "test drive" on the biggest competitor to the OpenStack project: Amazon Web Services's cloud. READ MORE

WEBCAST: Egnyte

Consider Hybrid Approach to File-Sharing

Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

Six tips for BYOD Security from IBM

Big, small or in between, every company can use these. READ MORE

Net neutrality ruling unlikely to immediately impact broadband market

Despite a big win in a federal appeals court, Internet service providers are unlikely to make dramatic changes in the network access given to content providers such as ESPN, Facebook and Netflix, experts say. READ MORE

Apple will pay out $32.5M to settle FTC iTunes complaints

Apple today agreed to pay $32.5 million to settle complaints the Federal Trade Commission said the company billed consumers for millions of dollars of charges incurred by children in kids' mobile apps without their parents' consent. READ MORE

The 8 Most In-Demand Big Data Roles

As more organizations begin to get on the big data bandwagon, demand for IT professionals with the skills to collect, organize, analyze and architect disparate sources of data is on the rise. READ MORE

WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations

Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Chrome 32: First look

2. SDN will never happen, says VMware exec

3. Juniper should reevaluate switching, security products investor says

4. Massive denial-of-service attacks pick up steam, new nefarious techniques

5. New Windows 9 rumors confirm the old Windows 9 rumors

6. The mixed fate of Sun tech under Oracle

7. Appeals court strikes down FCC's net neutrality rules

8. Galaxy S5 rumors point to plenty of options from Samsung

9. 8 ways that Chrome may be challenging Windows

10. The world's coolest, greenest data centers

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment