| 10 cheap or free ways to make your old PC run faster Teach an old dog new tricksImage by Kevin Jarrett via Flickr/Creative CommonsThere's a reason that unboxing videos and the phrase "new car smell" are firmly ensconced in the public groupmind. New stuff is exciting! New stuff is (theoretically) better! New stuff is just plain cool.To read this article in full or to leave a comment, please click here Read More WEBCAST: Alcatel-Lucent Enterprise
University Surpasses Students' Digital Expectations The explosion of mobile device use is testing the limits of legacy networks everywhere. In this webcast you will learn how Abilene Christian University meets the mobile access demands of 4500 University students, and 250,000 connections per day. Learn More WEBCAST: Collaborative Consulting
A Smarter Offshore Outsourcing Alternative Do you know the true cost of offshore outsourcing? Many organizations are measuring hourly rates alone, missing the additional costs, risks and complexities of offshoring. Join Rebecca Wettemann of Nucleus Research as she explains current trends and challenges with offshore outsourcing Live November 12th at 12:00-1:00 pm EST. Learn More Obama: Broadband should be regulated as a utility President Barack Obama has made his strongest statement on net neutrality to date, calling on the Federal Communications Commission to reclassify broadband as a regulated utility, and to prohibit broadband providers from charging Web content producers for paid traffic prioritization.Obama on Monday called on the FCC to reclassify broadband as a common carrier, subject to telephone-style regulations, and to ban broadband carriers from selectively blocking or throttling Web traffic. The president waded into a contentious debate about reclassifying broadband, coming down on the opposite side of many large broadband carriers.To read this article in full or to leave a comment, please click here Read More DARPA looking to drop "volleys" of small drones from larger aircraft Could a small pack of drones be launched from he underside of a B-52 to swarm a target or gather intelligence? That in part is what researchers at Defense Advanced Research Projects Agency (DARPA) are looking to explore.The agency recently put out a Request For Information to explore the feasibility and value of launching and recovering volleys of small unmanned aircraft from one or more existing large airplanes – think B-52, B-1, C-130.To read this article in full or to leave a comment, please click here Read More When Outlook drag-and-drop stops working ... So the drag-and-drop functionality in Microsoft Outlook flat-out stopped working for me this morning, presumably because it's Monday. I've never had this problem before, so I didn't know how to fix it. Fortunately, a quick search on "drag-and-drop not working in Outlook" turned up the following simple remedy from a site called Saniac: Just hit the escape key. (Saniac warned that you may have to do it more than once, but a single try worked fine for me.) To read this article in full or to leave a comment, please click here Read More HP's strange new SlateBook: A guided tour HP SlateBookWith the SlateBook 14, HP has delivered a notebook computer running the Android mobile OS. The question is, why? To be clear, this isn't an Android tablet with a detachable keyboard. This is a full-fledged notebook that runs Android—and only Android, a mobile OS meant for smartphones and tablets. The SlateBook isn't officially sanctioned by Google. (The company focuses on developing its Chrome OS for notebooks.) So why did HP make it, and how well does Android work on a notebook? The company loaned me a SlateBook, which I used for a week in order to figure these questions out.To read this article in full or to leave a comment, please click here Read More Apple offers former iPhone users way to stop it from hijacking their text messages Apple is at last offering a simple way for former iPhone users to receive text messages sent into limbo by the company's iMessage service.The problem affects former iPhone users who transferred their SIM card or phone number to a non-Apple phone. If they had set up their iPhone to route text messages to other iPhone owners via iMessage rather than their carrier's SMS (Short Message Service) servers, they were often unable to receive text messages from those people after ditching their own iPhone.MORE ON NETWORK WORLD: iPhoneys: Apple iPhone 6 concepts Affected messages continued to be routed through Apple's proprietary iMessage service, which sends them direct to the specific device Apple has linked with the phone number, rather than the one the carrier currently associates with the number. Because iMessage only works with iOS devices, those messages would not arrive on non-Apple phones.To read this article in full or to leave a comment, please click here Read More Raspberry Pi Model A+ cuts size, power and price to only $20 PC World The Raspberry Pi project has squeezed a bit more juice out of the world's greatest educational and hobbyist computing platform, producing a new Model A+ that shadows improvements made in the Model B+ announced in July.The Model A+ uses the same Broadcom BCM2835 system on a chip (SoC) as the Model A but brings the improvements of Model B+ to the Model A which has only 256MB of RAM (which stays the same on the A+). The most important of these is probably its smaller size, reducing the length from 86mm to 65mm.To read this article in full or to leave a comment, please click here Read More Pica8 blends SDN with traditional networking As hot as the topic of software defined networking (SDN) has been over the past few years, many organizations have stayed away from it. It's not because SDNs don't provide value, but because the technology can be quite disruptive to network operations. Most of the network managers and even IT leaders I interview seem to have a good grasp on the long-term value that SDN can bring, but there's a fear that the operational challenges it creates may outweigh the benefits.One of the challenges that organizations face when deploying a software defined network (SDN) is bridging the traditional network with the SDN. Traffic on a traditional network moves around based on the rules established in layer 2/layer 3 networking. OpenFlow, on the other hand, uses different protocols, custom policies, and a different set of rules to determine network behavior.To read this article in full or to leave a comment, please click here Read More Tor Project mulls how Feds took down hidden websites Little is known about how U.S. and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used technology that hides their true IP addresses.The websites were set up using a special feature of the Tor network, which is designed to mask people's Internet use using special software that routes encrypted browsing traffic through a network of worldwide servers.Tor -- short for The Onion Router -- also allows people to host "hidden" websites with a special ".onion" URL, which are difficult to trace. But law enforcement appears to have figured out a method to find out where sites are hosted, a serious flaw that could pose risks to people who aren't running websites that sell drugs and weapons.To read this article in full or to leave a comment, please click here Read More Black Friday might bring early openings at Apple Stores Apple is mum on its Black Friday plans so far, but Apple Insider reports that many Apple Stores will open earlier than usual on Nov. 28, the big shopping day after Thanksgiving.According to the report, 8AM local time openings will be common at Apple Stores this Black Friday, though that's actually a later opening than last year and in years past. While some stores might list their usual 10AM opening times, employees might be given the go-ahead to let customers in a bit early to snap up the latest iPhone, iPad, Mac and other products.To read this article in full or to leave a comment, please click here Read More New products of the week 11.10.2014 Products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.TypeWATCH for Individuals (TW4I)Key features: TypeWATCH for Individuals is an e-Biometric application to protect against fraudulent systems from compromised credentials. TW4I is "plug&play" entry-level version of the Enterprise version of TypeWATCH. More info.To read this article in full or to leave a comment, please click here Read More | |
No comments:
Post a Comment