High-tech

High-tech
Light

Friday, November 14, 2014

How Apple, Samsung and BlackBerry are fighting to win the enterprise

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 14, 2014 2:36 PM
Subject: How Apple, Samsung and BlackBerry are fighting to win the enterprise
To: <aquarianm@gmail.com>
Cc:

Bloodiest tech industry layoffs of 2014, so far

FBI: Crooks have stolen $20 million with false Internet ads

Network World Daily News PM
November 14, 2014

How Apple, Samsung and BlackBerry are fighting to win the enterprise

Samsung Electronics' deal with BlackBerry and Apple's efforts to make it easier to configure and deploy massive numbers of iPhones highlight how the smartphone makers are battling for supremacy among enterprise users.As the smartphone market becomes saturated in the U.S. and Europe, enterprise users will be big winners. To continue to grow, manufacturers are courting CIOs more aggressively by making products more secure and easier to manage."The big benefit we are seeing is that costs are coming down for managing these devices," said Leif-Olof Wallin, research vice president at Gartner.Samsung has been trying to replicate its consumer success in the enterprise, but has so far struggled to make much headway. The company is hoping to change that by joining forces with BlackBerry to integrate BES (BlackBerry Enterprise Server) 12 with Galaxy smartphones and tablets. The devices will still be protected using Samsung's Knox technology, but BlackBerry will add its network infrastructure and management capabilities, the company said in an announcement Thursday.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Bloodiest tech industry layoffs of 2014, so far

2. FBI: Crooks have stolen $20 million with false Internet ads

3. The High Flying Week in Commercial Drones

4. Suspected WireLurker malware creators arrested in China

5. ScaleBase takes relational databases to web scale in an instant

6. INSIDER 16 tips for thriving as an IT contractor

7. Online video moguls team up to set standards, meet growing demand

8. Apple: Masque hasnt attacked any iPhone, iPad users yet

9. How Silicon Valley startups try to lure top engineering talent

10. 10 amazing Linux desktop environments you've probably never seen

WHITE PAPER: Onapsis Inc.

How to Identify SAP Security Weak Spots

Threats affecting the SAP application layer are frequently overlooked, leaving systems exposed to malicious attacks. This SAP Insider highlights the security blinds spots and explains how automated assessment and audit solutions enable organizations to monitor, detect, prioritize, and prevent threats to close security gaps and mitigate risks. Learn More

Bloodiest tech industry layoffs of 2014, so far

Microsoft leads the way, but has plenty of company on jobs cut front READ MORE

FBI: Crooks have stolen $20 million with false Internet ads

Many people should be wary of Internet ads, especially for large ticket items, but apparently enough folks aren't. The Internet Crime Complaint Center today said over $20 million has been scammed and more than 6,800 complaints have been logged between June 2009 and June 2014 over rip-off ads. + More on Network World: John Dillinger, Bonnie and Clyde escape the shredder as FBI finishes vast digital fingerprint/ID project + The criminals have mostly been targeting online consumers with false advertisements for high priced items such as automobiles, boats, heavy equipment, recreational vehicles, lawn mowers, tractors and other high-end gear.To read this article in full or to leave a comment, please click here READ MORE

The High Flying Week in Commercial Drones

[View the story "The Week in Commercial Drones" on Storify] To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Moving Beyond the Costs and Risks of IT Friction

In a first-of-its-kind study, IDC has docu­mented the costs of business risks cre­ated when business and IT teams fail to communicate effectively. Hear how enterprises are addressing the friction associated with IT needs and the gaps and opportunities that exist between business needs and IT service delivery models. Learn More

Suspected WireLurker malware creators arrested in China

Beijing police have arrested three people suspected of developing the "WireLurker" malware that may have infected as many as hundreds of thousands of Apple users.Local authorities arrested the three suspects on a tip from Chinese security company Qihoo 360 Technology, the Beijing police's Internet security team said Friday.The three suspects, surnamed Chen, Li and Wang, were detained Thursday and charged with creating and spreading the malware, the police said in a post on its official Sina Weibo account. The police did not publish the full names of the suspects.To read this article in full or to leave a comment, please click here READ MORE

ScaleBase takes relational databases to web scale in an instant

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  When Mark Zuckerberg and his associates developed a little application called Facebook back in 2004, they had no idea how wildly popular it would become. Designed to replace a college directory, Facebook took off among college students and had 12 million regular users within two years. At Facebook's ten year mark, the application has more than 1.23 billion users worldwide. More than half a billion people access the application every day.Now picture yourself being the database administrator (DBA) who has to figure out how to accommodate such rapid growth. All those users and all their postings have to be organized and managed without impacting performance and availability of the application.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

16 tips for thriving as an IT contractor

When demand exceeds the supply of available IT talent, many companies are using contractors to help fill the gaps. IT contractors provide manpower when workloads spike and can bring key expertise and skills to a team. (See related story, Life as an IT contractor)To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs

This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Online video moguls team up to set standards, meet growing demand

Some of the most powerful companies in video networks and delivery plan to define an open architecture for streaming video as part of a new alliance that includes Cisco Systems, Comcast, Ustream and Yahoo, but not Netflix or YouTube.The Streaming Video Alliance, announced Friday, says it wants to help scale the infrastructure for online video and make it more efficient while maintaining the quality of the viewer experience. To do that, it plans to "redefine the way online video is streamed across mobile and fixed networks" while fostering deeper collaboration and speeding up innovation.Streaming video is growing fast and taking up an increasing share of network capacity as consumers turn to online sources of entertainment instead of, and in addition to, broadcast TV and traditional cable. It's also a hotly contested area where broadband providers and over-the-top Internet video companies such as Netflix have clashed over the business side of delivering large amounts of content to consumers. Much of the debate over net neutrality centers on whether service providers can sell network priority to streaming video companies.To read this article in full or to leave a comment, please click here READ MORE

Apple: Masque hasnt attacked any iPhone, iPad users yet

Following a U.S. government warning about an iPhone and iPad security threat dubbed Masque Attack, Apple has issued a statement assuring customers that they're probably okay. Masque Attack could enable hackers to exploit iPhones Masque Attack, which security vendor FireEye disclosed information about earlier this week, allows attackers to swap in fake apps for legitimate ones, and potentially grab sensitive data. To read this article in full or to leave a comment, please click here READ MORE

How Silicon Valley startups try to lure top engineering talent

We all know that there's a huge engineering talent shortage in Silicon Valley, right? That anyone who knows the difference between a 1 and a 0 can instantly make more money than the President of the United States, and maybe even get super-rich before they turn 25.See also: Yes, there's a tech bubble: Facebook's mobile ad success proves it But how all that actually works—especially at the highest levels—is a juicy story, one which tech news site The Information did a great job illuminating in an interview this week with Ali Behnam (paid subscription required), co-founder and managing partner at Riviera Partners, a leading San Francisco tech recruiting firm. According the piece's author, Eric. P. Newcomer, Riviera helped Uber, Dropbox, and Twitter, for example, hire vice presidents of engineering.To read this article in full or to leave a comment, please click here READ MORE

10 amazing Linux desktop environments you've probably never seen

One of the most amazing things about Linux is how versatile it is. Let's face it - Windows and MacOS X are...boring. They look exactly how they look. When it comes to making your computer look and behave however you like, Linux is king. Let's take a stroll through some truly interesting, and beautiful, Linux Desktop Environments - the ones that many of us have never even seen. READ MORE

WHITE PAPER: OutSystems

Mobile App Backlog

New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More

SLIDESHOWS

Ten operating systems for the Raspberry Pi

The OSes the Raspberry Pi can run will amaze you!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Black Friday iPhone 6, iPad Air deals spill forth from Walmart

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. U.S. government issues alert about Apple iOS "Masque Attack" threat

4. Black Friday iPad fire sale at Staples

5. Ten operating systems for the Raspberry Pi

6. Black Friday deals from Target, Best Buy on iPhones, iPads

7. Cisco winning SDN battle: Chambers

8. 8 free online courses to grow your tech skills

9. Black Friday sales promise iPhone 6 deals

10. Google quadruples Nobel Prize in Computing to $1M

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment