High-tech

High-tech
Light

Friday, May 2, 2014

Google aims for purity with Android Silver

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: May 2, 2014 8:16 AM
Subject: Google aims for purity with Android Silver
To: <aquarianm@gmail.com>
Cc:

7 cool free open source projects you need to check out

Why ABM Is Migrating from VMware to Hyper-V

Network World Daily News AM
May 02, 2014
Share this email

Google aims for purity with Android Silver

If you haven't heard of Android Silver -- assuming it's real -- yet, it's because it's not been officially announced by Google.

READ MORE
 

Issue highlights

1. 7 cool free open source projects you need to check out

2. Why ABM Is Migrating from VMware to Hyper-V

3. Get LinkedIn with Network World

4. Afraid of the cloud? How to handle your fears

5. IT Salaries for the 20 Hottest Tech Skills

6. White House big-data panel calls for privacy protections, ignores NSA

7. Jumpr, charge your pad or laptop or even jumpstart your car

8. Internet Explorer security fault forces Microsoft to save Windows XP one more time

9. HP creates a new way to sell data centers

10. Enterprises Are Not Monitoring Access to Sensitive Data

11. INSIDER Top perks that IT professionals should ask for

WEBCAST: VMware | IBM

Virtualization Infrastructure With IBM and Vmware

Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. Learn More

7 cool free open source projects you need to check out

The free open source world continues to expand at a phenomenal pace. These are great "jumping off" points for developing products and technologies. READ MORE

Why ABM Is Migrating from VMware to Hyper-V

Facilities solutions specialist ABM has more than 100,000 employees and customers around the world, all served by a small IT team struggling to deliver IT services to its constituents. It needed to find a way to deliver IT services faster and cheaper and says virtualization with Hyper-V is the way forward. READ MORE

Get LinkedIn with Network World

Please follow Network World's LinkedIn Company Page to get the latest networking news in your LinkedIn stream READ MORE

WEBCAST: Network Instruments

5 Best Practices for Optimizing UC Monitoring

This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More

Afraid of the cloud? How to handle your fears

A study released this week shows that 73% of IT executives believe cloud providers are hiding performance problems. READ MORE

IT Salaries for the 20 Hottest Tech Skills

Unemployment rates in the IT industry remain low. That's good news for you because it means to compete for top tech talent companies are offering higher salaries. READ MORE

White House big-data panel calls for privacy protections, ignores NSA

Congress should take action to protect privacy in response to a growing big-data revolution, a White House panel has recommended, but its report does not address wide-ranging surveillance and data-collection programs at the U.S. National Security Agency. READ MORE

WHITE PAPER: Intigua

Systems Management Virtualization

Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

Jumpr, charge your pad or laptop or even jumpstart your car

READ MORE

Internet Explorer security fault forces Microsoft to save Windows XP one more time

Out-of-band fix for a zero-day flaw in Internet Explorer will include XP, Microsoft says READ MORE

HP creates a new way to sell data centers

Hewlett-Packard is selling its data center services in a new way, via a program it calls "facilities as a service," or FaaS. READ MORE

Enterprises Are Not Monitoring Access to Sensitive Data

If you want to make a cybersecurity professional uncomfortable, simply utter these two word: 'Data exfiltration.' Why will this term garner an emotional response? Because data exfiltration is a worst-case outcome of a cyber-attack - think Target, the NY Times, Google Aurora, Titan Rain, etc. Simply stated, 'data exfiltration' is a quasi-military term used to describe the theft of sensitive... READ MORE

INSIDER

Top perks that IT professionals should ask for

You've been slaving away at your job since the economic downturn, taking on more work with no raise in pay and believing a light would one day appear at the end of the tunnel. According to both DICE and Robert Half Technology, that day is here. READ MORE

WHITE PAPER: IBM

Cloud Computing for Midsize Business

Read this paper to see what IBM discovered about how companies like yours are adopting, implementing and using cloud computing solutions. Learn about the current rate of adoption, as well as drivers, barriers, and considerations that are influencing the adoption of cloud computing. Learn More

SLIDESHOWS

Fave Raves: 33 tech pros share their favorite IT products

It takes many tools to keep IT systems running smoothly, and tech pros have their personal favorites. What made the cut?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How Adobe Is Moving on From Flash to Embrace HTML5

2. 2014 technology industry graveyard

3. Florida commuter's illegal jammer blocked more than cell talkers

4. 6 free network vulnerability scanners

5. Unplugging the data center

6. Don't forget how close Microsoft came to losing Novell lawsuit

7. SDN start-up targets enterprise WAN complexity

8. Microsoft warns Internet Explorer 6 to 11 vulnerable to zero-day spotted in the wild

9. VMware outlines 'vision' for unified mobile security and management

10. 10 users IT hates to support

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment