High-tech

High-tech
Light

Wednesday, January 8, 2014

Riverbed mulls $3B deal to go private

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 8, 2014 3:13 PM
Subject: Riverbed mulls $3B deal to go private
To: <aquarianm@gmail.com>
Cc:

Best of CES 2014: In Pictures

Citrix buys Framehawk to give virtual desktops a boost

Network World Daily News PM
January 08, 2014
Share this email

Riverbed mulls $3B deal to go private

An investment company wants to acquire the WAN optimization vendor

READ MORE
 

Issue highlights

1. Best of CES 2014: In Pictures

2. Citrix buys Framehawk to give virtual desktops a boost

3. What 20GB of free DropBox storage? Buy a Dell

4. 7 security mistakes people make with their mobile device

5. VMware taps its R&D chief for vacant CTO role

6. 10 security, privacy issues you might not know about your car's auto-location services

7. Intel announces death of McAfee brand. Will it be that simple?

8. Must-Have Android Widgets for Your Smartphone and Tablet

9. 3 Powerful Laptops Built for Serious Business

10. Twitterverse dips into Velveeta 'shortage'

11. CES 2014: You've never seen CES this way

12. Vendors hope wireless charging will resonate with consumers

13. As Yahoo makes encryption standard for email, weak implementation seen

14. Governments urged to set up global bounty system to buy security vulnerabilities

WEBCAST: Dell and Intel®

Unleashing the potential of your virtual environment

IT organizations continue to strive for efficiency in their virtual environments. These efforts are often undermined by traditional practices involving the purchase and deployment of infrastructure resulting in suboptimal management environments and inflexible architectures. View Now

Best of CES 2014: In Pictures

Here's what's grabbing our attention right now at the sprawling CES 2014 gadget show in Las Vegas READ MORE

Citrix buys Framehawk to give virtual desktops a boost

Citrix Systems has acquired Framehawk for an undisclosed sum, and will use the company's technology to improve the performance of virtual desktops and applications over wireless networks. READ MORE

What 20GB of free DropBox storage? Buy a Dell

Dell announced this week a promotion that provides customers 20 GB of free cloud storage at DropBox with the purchase of a Dell tablet or personal computer. MORE FREE CLOUD STORAGE: 12 Free cloud storage options READ MORE

7 security mistakes people make with their mobile device

Mobile devices, especially smartphones, have ushered businesses into a new era of productivity and working on-the-go. But with those advances and added convenience comes a wealth of security blunders just waiting to happen. Here are some of the worst mistakes users can make with their mobile devices and how to avoid them. READ MORE

WHITE PAPER: CDW

Software Asset Management: Practices for Success

This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

VMware taps its R&D chief for vacant CTO role

VMware has named Ben Fathi as its CTO, filling a prominent executive position that has been vacant for more than a year. READ MORE

10 security, privacy issues you might not know about your car's auto-location services

As cars become more wired to the Internet and other communications services, the threat that your personal information and privacy could be exploited goes up exponentially. You can understand the concerns since at least one study from Frost & Sullivan found that the market for telematics services provided by auto manufacturers in North America is expected to increase from 11.8 million subscribers in... READ MORE

Intel announces death of McAfee brand. Will it be that simple?

Three and a half years after Intel acquired McAfee, the chip giant looks set to ditch the famous brand that still bears the name of its colourful founder, John McAfee. READ MORE

Must-Have Android Widgets for Your Smartphone and Tablet

If you're not using Android widgets, you're not getting the most out of your Android smartphone or tablet. CIO.com's Al Sacco spotlights a collection of unique widgets, all free and all worth a download. READ MORE

WEBCAST: IBM

Webinar: IBM IIM for Fraud, Abuse and Waste in Government

View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More.

3 Powerful Laptops Built for Serious Business

Looking for a laptop with serious processing power? CIO.com put three high-end laptops -- the Soni Vaio Flip 15, the HP ZBook 15 and the Acer Aspire V3 -- to the photo- and video-editing test to see which offers the best bang for the buck. READ MORE

Twitterverse dips into Velveeta 'shortage'

The Internet is generally of two minds regarding the alleged "shortage" of Velveeta: Some, like me, smell a cheesy PR stunt, while others see nothing more than an opportunity to tweet up a batch of gooey snark. Here's a taste of the latter: READ MORE

CES 2014: You've never seen CES this way

CES 2014: You've never seen CES this way Drone enthusiast Chris McBeth of photography startup Traveling Nerds launched his DJI Phantom quadcopter over the Las Vegas Convention Center to grab some panoramic perspectives of the world's... From: Network World Videos Views: 2 0 ratings Time: 02:01 More in Science & Technology READ MORE

Vendors hope wireless charging will resonate with consumers

A handful of vendors have introduced products based on resonant wireless power transfer at International CES, which will increase charging distances and allow users to charge multiple products at the same time. READ MORE

As Yahoo makes encryption standard for email, weak implementation seen

Yahoo has started to automatically encrypt connections between users and its email service, adding an important security layer that rival Gmail has had for almost four years, but its implementation needs work, according to at least one security expert. READ MORE

Governments urged to set up global bounty system to buy security vulnerabilities

The criminal market for software vulnerabilities is now so sophisticated and dangerous that governments should consider setting up a global programme to purchase flaws before they fall into the wrong hands, a researcher has argued. READ MORE

WHITE PAPER: HP and Intel® Xeon® processors

Top Reasons to Choose HP BladeSystem

With continuously changing business requirements and technology playing a strategic role in day-to-day business, your organization needs a server infrastructure that enables you to take advantage of new opportunities while containing cost and complexity. Learn More

SLIDESHOWS

2014's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1989.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Analyst: Save millions, don't renew Microsoft Enterprise Agreements

2. Best of CES 2014: In Pictures

3. SDN showdown: Examining the differences between VMware's NSX and Cisco's ACI

4. Cryptolocker scrambles eight years of data belonging to US town hall

5. The nerdiest, most high-tech business card you've ever seen

6. 12 jobs getting the biggest raises in 2014

7. Ubuntu 13.10 takes aim at Microsoft, Apple, Google

8. Cisco takes TV to the cloud

9. Trojan program hijacks World of Warcraft accounts despite two-factor authentication

10. Why can't Microsoft find a CEO?

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment