High-tech

High-tech
Light

Monday, August 18, 2014

CIOs reveal their must-have mobile apps

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 18, 2014 9:01 PM
Subject: CIOs reveal their must-have mobile apps
To: <aquarianm@gmail.com>
Cc:

New products of the week 08.18.2014 | Powerful Soap router surpasses funding goal, headed for production

Network World After Dark

Forward this to a Friend >>>


INSIDER
CIOs reveal their must-have mobile apps
For many of us, mobile apps have become a way of life. According to Nielsen, U.S. Android and iPhone users age 18 and older spend 65% more time each month using apps than they did just two years ago. Specifically, in fourth-quarter 2013, this population spent 30 hours, 15 minutes using apps, which is a half-day more than the 18 hours, 18 minutes they spent in fourth-quarter 2011. To read this article in full or to leave a comment, please click here(Insider Story) Read More


WEBCAST: IBM

Charting Your Analytical Future
Date: August 26, 2014, 11:00 AM EDT The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. Register Now>>

WHITE PAPER: IBM

Forrester 2014 Dynamic Case Management Wave
Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>>

New products of the week 08.18.2014
Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Product name: Honeypot Security Analytics SuiteTo read this article in full or to leave a comment, please click here Read More

Powerful Soap router surpasses funding goal, headed for production
Fed up with poking around cornball router settings on a laptop? Here's a router with an evolutionary UI—a full touchscreen—plus it has all the radios and connections you could possibly want. Read More

17 ways to hate Microsoft Outlook 2013 less
Few software products draw such universal -- and deserved -- scorn as Outlook 2013. Here's how to tame the beast Read More

Brocade Pitches Open Networking to Cash-Strapped Feds
WASHINGTON – If storage and compute power can be purchased on a usage-based pricing model, like a utility, then why can't networking follow the same path? Moreover, why shouldn't that network run on an open architecture that fosters competition among multiple service providers?That's Brocade's pitch to the federal government – a market that the networking vendor is targeting aggressively in its bid to gain share from its larger rival Cisco Systems.MORE ON NETWORK WORLD: 25 crazy and scary things the TSA has found on travelers For weeks, Brocade has blanketed subway stations in the nation's capital with its Network Facts ad campaign, touting the cost savings and efficiency gains to be won with a pay-per-use networking environment built on open protocols to support a multi-vendor environment.To read this article in full or to leave a comment, please click here Read More

Windows Phone isn't dead, but it needs a new reason to live
After four years of uphill battles, Windows Phone appears to be reaching its peak.IDC recently estimated that Windows Phone shipments fell to 7.4 million units in the second quarter of 2014—down from 8.2 million a year earlier—even as Android and iPhone shipments increased. As a result, Windows Phone's Q2 2014 market share dropped from 3.4 percent to 2.5 percent year-over-year.The news has led some pundits to declare that Windows Phone is on life support, while others have expressed optimism that Microsoft can turn things around. But whether you're rooting for Windows Phone or not, it's hard to see Microsoft's fortunes improving without a clearer turnaround plan.To read this article in full or to leave a comment, please click here Read More

Senator questions airlines' data privacy practices
A senior U.S. senator is asking airlines about their data privacy practices, saying he's concerned about what information the companies are collecting and sharing with third parties.Some consumer advocates have raised concerns that airline privacy policies "can contain substantial caveats and that it is difficult for consumers to learn what information airlines and others in the travel sector are collecting, keeping, and sharing about them," Senator John "Jay" Rockefeller, a West Virginia Democrat, wrote in a letter to 10 U.S. airlines Monday.The airlines receiving the letters included United Airlines, Delta Air Lines, American Airlines and Southwest Airlines. Airlines contacted about Rockefeller's letter didn't immediately respond to requests for comments.To read this article in full or to leave a comment, please click here Read More

iPhone 5C's China bust raises questions about Apple's pricing for '14 models
Apple's iPhone 5C, the lower-priced model introduced last year -- by many accounts to boost sales in countries like China -- has, in fact, done poorly in the People's Republic, according to an industry analyst."The [iPhone] 5C is not doing well in China," said Ben Bajarin of Creative Strategies in an email reply to questions. "The audience that has been buying iPhones there to date is higher-end and can afford the premium device. A $550 5C was not attractive to them because they could afford and wanted the premium [iPhone] 5S."MORE ON NETWORK WORLD: iPhoneys: Apple iPhone 6 concepts Bajarin based his iPhone 5C take on smartphone usage data he collected from Alibaba, the massive China-based e-commerce conglomerate. Last year, Alibaba acquired a mobile analytics company called Umeng, which has been described as "the Flurry of China."To read this article in full or to leave a comment, please click here Read More

About 4.5M face risk of ID theft after hack of hospital network
Community Health Systems says Chinese hackers accessed names, social security numbers and other data of people it treated or referred Read More

Password1 tops lists of top 10 corporate environment passwords
While weak or default password use is not exactly breaking news, learning that over half of 626,718 hashed passwords could be cracked in a few minutes is food for thought. The passwords were collected during Trustwave pen tests of corporate environments in 2013 and part of 2014. Most of those came from "Active Directory environments and included Windows LAN Manager (LM)- and NT LAN Manager (NTLM)-based passwords." Active Directory's password complexity policy requires a minimum of eight characters and three of the five character types (lowercase letters, uppercase letters, numbers, special and Unicode). Unfortunately, "Password1" complies. So does, for example, a user's new baby's name capitalized and followed by the year. Any attempt at cracking passwords will begin with a number of predictable keywords that many users select as the basis for their password.To read this article in full or to leave a comment, please click here Read More

Best and funniest Apple iWatch design concepts
Many signs point to Apple busting into the smartwatch market by year-end with what's generally been referred to as the iWatch. As with iPhones and iPads before it, the iWatch has received the attention of creative types looking to give Apple a few ideas…ALSO: Apple iPhone 6 conceptsTo read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Google wraps its trans-Pacific fiber cables in Kevlar to prevent against shark attacks

2. Gartner: Think twice before deploying Windows 7

3. New Microsoft same as the old Microsoft

4. Why TCP/IP is on the way out

5. Attacks exploited YouTube & Microsoft Live to install surveillance

6. The world's coolest and geekiest mailboxes

7. The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

8. iPhone 6 rumor rollup for the week ending Aug. 15

9. 10 things about (the Internet of) things

10. Top 20 colleges for computer science majors, based on earning potential

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment