High-tech

High-tech
Light

Wednesday, January 22, 2014

Why VMware spent $1.5B on AirWatch

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 22, 2014 2:20 PM
Subject: Why VMware spent $1.5B on AirWatch
To: <aquarianm@gmail.com>
Cc:

15 geekiest snow and ice sculptures

TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda

Network World Daily News PM
January 22, 2014
Share this email

Why VMware spent $1.5B on AirWatch

VMware's purchase of AirWatch shows just how important the mobile device management market is for not only end users, but big technology companies too. The move - which at $1.5 billion is the largest acquisition in company history – also sets VMware on a path to further diversity from its core virtualization and cloud computing markets and almost instantly become a major player in the mobile market.

READ MORE
 

Issue highlights

1. 15 geekiest snow and ice sculptures

2. TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda

3. Why I did it: Former hacker Mitchell Frost explains his motivation

4. 5 Hybrid IT Roles Your Business Needs to Succeed in 2014

5. LogMeIn pulls plug on free remote access; rage ensues

6. Big Data startup MemSQL raises $35 million

7. Amazon posted 16,100 IT job ads last year, tops in U.S.

8. Shattered: Apple could have used some Gorilla Glass on its Fifth Ave NYC store

9. Google loses Android patent lawsuit, faces claim for $125 million in damages

10. 10 trends in IT spending for 2014

11. Verizon: US gov't made 320,000 requests for customer info in '13

12. IBM's low-end server business back in play; Dell, Fujitsu, Lenovo circling

13. Gates talks Microsoft CEO search: Nothing to see, move along

14. 7 simple rules for hiring great developers

RESOURCE COMPLIMENTS OF: CIO Perspectives Atlanta Conference

Invite to CIO Perspectives Atlanta Conference - March 12

Agenda highlights include: Innovative Approaches to Digital Disruption & Business Model Change; Transforming the IT-Business Partnership; Finding and Keeping Great IT Talent; Strategies for C-Suite Leadership & Success; Innovative Approaches to Digital Disruption & Business Model Change. Visit our website and register today!

15 geekiest snow and ice sculptures

When the going gets cold, the Linux, Mac, Star Wars and other geeks get creative READ MORE

TrustyCon vs. RSA and NSA: New conference pushes trustworthy agenda

Who do you trust? That's a question asked increasingly by a security industry with a growing sense that the National Security Agency (NSA) has sought to weaken encryption or get backdoors into computers, based on documents leaked by Edward Snowden to the media. Now, trust is also the theme of a new conference called TrustyCon that will vie for attention on Feb. 27 in San Francisco while the big RSA Conference for security pros is also taking place in that city. READ MORE

Why I did it: Former hacker Mitchell Frost explains his motivation

In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com. He is accused of taking down the O'Reilly site five times, as well as disrupting the University of Akron's network during a DDOS attack Frost allegedly launched on a gaming server hosted by the university. READ MORE

5 Hybrid IT Roles Your Business Needs to Succeed in 2014

This year, the ability to simply configure and run a server or develop software in isolation won't be enough. Employers will aggressively pursue workers with multi-dimensional talent -- combinations of technology, domain, business, process and people skills. READ MORE

WHITE PAPER: Apperian

Unlock the Value of Enterprise Mobility

Download this guide and learn how to manage the secure deployment of enterprise mobile apps and data, while still encouraging the levels of employee adoption needed to drive the productivity and ROI gains that are possible. Learn More

LogMeIn pulls plug on free remote access; rage ensues

Angry users of LogMeIn's free remote access service are lashing out at the company for giving them what amounts to a week's warning that their plugs would be pulled. READ MORE

Big Data startup MemSQL raises $35 million

MemSQL, a database startup founded by former Facebook engineers, has raised $35 million in a series B round of venture funding. READ MORE

Amazon posted 16,100 IT job ads last year, tops in U.S.

The employer with the most IT job postings last year was Amazon.com, with 16,146 ads, exceeding most other IT firms by a wide margin, according to a new report. READ MORE

Shattered: Apple could have used some Gorilla Glass on its Fifth Ave NYC store

Making the rounds on social nets even faster than iPhone 6 design concepts: images of the shattered pane of glass at the striking 32-foot-high transparent Apple Store near Central Park in New York City. Reportedly, a snow clearing crew damaged the pane, which one blog estimated could cost $450K to replace. Otherwise, it's business as usual at the store. READ MORE

WHITE PAPER: HP and Intel®

Storage Insight: Debunk the Data Storage Myths

Of all the obstacles standing in the way of building a better IT infrastructure, misinformation may be the most daunting. This informative eBook is designed to provide the immediate insight you need to make the right decisions about some of the most important IT issues your enterprise will ever face. Read Now>>

Google loses Android patent lawsuit, faces claim for $125 million in damages

SimpleAir is seeking $125M in damages from Google after a jury found that push notification services in Android infringe on a SimpleAir patent, the company said Tuesday. READ MORE

10 trends in IT spending for 2014

After years of maintenance-only spending, IT leaders are ready to invest. Find out which technologies -- and which IT professionals -- are pulling down the dough. READ MORE

Verizon: US gov't made 320,000 requests for customer info in '13

Verizon Communications received more than 320,000 requests for customer information from U.S. federal, state and local law enforcement agencies in 2013, more than 100 times the number of requests from any other country, the telecom carrier said in its first surveillance transparency report. READ MORE

IBM's low-end server business back in play; Dell, Fujitsu, Lenovo circling

IBM has revived efforts to sell its low-end server business and Dell, Fujitsu and Lenovo are all lining up to take a look, according to reports this week. READ MORE

Gates talks Microsoft CEO search: Nothing to see, move along

Microsoft Chairman Bill Gates dodged questions yesterday about the lengthening search for a new chief executive to run the company he co-founded nearly 39 years ago. READ MORE

7 simple rules for hiring great developers

The war for developer talent is hotter than ever. Whether you're trying to build mobile apps, redesign the user experience on your public website, or keep business-critical applications on the cutting edge, everyone needs code. READ MORE

WHITE PAPER: Dell

Enterprise Governance and Automation for AWS & Hybrid Clouds

Cloud solutions like AWS allow you to increase operational agility and reduce costs. Now you need a fast and easy way to increase security, improve governance and simplify hybrid cloud management. That's where a cloud management solution comes into play. View Now

SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Better than TV! White spaces bring wireless bonanza to West Virginia

2. ATMs could be compromised when Windows XP support ends

3. 30 years of Apple's Mac computer

4. Top 25 most commonly used and worst passwords of 2013

5. 12 privacy-destroying technologies that should scare you

6. Target hackers may have stolen useless data

7. Brocade exits network adapter business

8. How Apple and Pepsi fumbled their 2004 Super Bowl ad play

9. Survey sheds light on mobile-manic young workers

10. Three-year, 27,000 drive study reveals the most reliable hard drive makers

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment