High-tech

High-tech
Light

Tuesday, March 4, 2014

10 attempts to reinvent the world that flopped

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Mar 3, 2014 9:01 PM
Subject: 10 attempts to reinvent the world that flopped
To: <aquarianm@gmail.com>
Cc:

  The paranoid's survival guide, part 1: How to protect your personal data | 3rd party software, not Microsoft's, blamed for 76% of vulnerabilities on average PC

 
  Network World After Dark

Forward this to a Friend >>>


10 attempts to reinvent the world that flopped
Every startup founder dreams of changing the world, and sometimes it works. But more often, even the best ideas run into resistance and obstacles from unexpected sources. Read More
 


WHITE PAPER: Limelight Networks

Why Web Site Performance Is an IT Imperative
A slow or inefficient Web site can have a direct impact on your business. Recently, IDG Research explored the challenges enterprises face in delivering content across multiple devices. Find out how adjusting to these challenges while meeting performance objectives has become a top concern for senior IT managers. View Now

WHITE PAPER: Citrix Systems
 
The top 5 truths behind what the cloud is not
There’s no doubt that cloud is a major paradigm shift for enterprise organizations from the way services are delivered, to the underlying solutions deployed to enable those services. This whitepaper clears the confusion around cloud to help you shape a successful strategy and implementation plan. Learn more

The paranoid's survival guide, part 1: How to protect your personal data
Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information. Read More
 

3rd party software, not Microsoft's, blamed for 76% of vulnerabilities on average PC
Don't blame Microsoft if your PC is insecure, because three quarters of reported security vulnerabilities in 2013 were found in third-party software and not Microsoft programs. Yet also according to the Denmark-based security firm Secunia that analyzed vulnerabilities in the top 50 most-used software products, the number of holes in Windows 7 and XP doubled in 2013 and Windows 8 was the operating system... Read More
 

So you want to adopt SDN: Where do you start?
Software Defined Networking (SDNs) has been the hottest topic in networking over the past few years, and will likely continue to be over the next couple. It’s certainly dominated the traffic on this site and others. Read More
 

Nearly all apps are vulnerable in some way, report says
  Cenzic, a developer of application security assessment tools, has published a report (PDF) that claims 96% of all apps tested showed at least one security issue, ranging from poor programming practices to excessive access. Read More
 

An unfamiliar ring: Kids puzzle over rotary telephones (video)
Kids think it's funny when older folks can't always figure out which buttons to push on the latest game controllers or gadgets. Oh yeah, well you try to make sense of rotary phones, you young whippersnappers! (h/t: Devour) Read More
 

Humanoid robots as future companions create privacy challenges
NAO is a nearly two-foot tall humanoid robot made by Paris-based Aldebaran Robotics currently used for research, but destined for the consumer market. While companion robots are seen as easing the lives of humans, they also raise privacy concerns. Read More
 

Microsoft aims to make Office 365 'smarter' via social, APIs, machine learning
Microsoft will add new software, developer tools and capabilities to Office 365 in an attempt to make the cloud applications suite a "smarter" product that is better at helping people interact at work. Read More
 

RSA Conference Recap: Positive Direction for Security Industry
Last week's RSA Conference was a whirlwind of meetings, presentations, and unusual west coast rain storms. I'm not sure about the attendance numbers but it seemed especially busy - not surprising after the many cybersecurity events of 2013. I met with around 40 different security vendors throughout the week and heard some encouraging news. Rather than crow about the latest technology fad or... Read More
 

Another executive shakeup at Microsoft
Just a month after Satya Nadella took over as Microsoft CEO the executive inner circle is being overhauled, with two key leaders leaving the company and a third assuming significant new power. Read More
 

4 Ways Businesses Use Free Wi-Fi to Better Serve Customers
Wi-Fi is largely a given in today's homes and office buildings. Increasingly, though, retailers, schools and specialty shops are getting into the mix. Here four firms discuss the philosophy behind their free Wi-Fi. Read More
 

Man tries to pass off rib recipe as inspection sticker
The Twitter account of the Salisbury (Mass.) Police Department shared this tasty little morsel on Friday: a photograph of a clipping about recipes for short ribs that a motorist was allegedly pawning off as a car inspection sticker. "A suspect tried to pass this off as a valid inspection sticker on his car tonight," reads the tweet. "Needless to say he was arrested." Read More
 

Products of the week 03.03.14
Our roundup of intriguing new products from companies such as Dell and Piston Read More
 

 

SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Free tools for Windows Server admins

2. FIRST LOOK: Cisco Nexus 9000

3. Cisco: $300,000 prize for Internet of Things security apps

4. Google Map jacker called a hero by feds he wiretapped

5. First Look: Cisco ACI re-imagines the enterprise data center network

6. Who's hiring? Marketing lures more tech pros

7. Is SDN your next security nightmare?

8. RSA security attack demo deep-fries Apple Mac components

9. AT&T Petitions FCC to Trial All IP Voice in Two Cities

10. Six things companies do that thwart their IT security efforts


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment