High-tech

High-tech
Light

Tuesday, December 2, 2014

Groupware hug: Lotus Notes turning 25

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 1, 2014 9:01 PM
Subject: Groupware hug: Lotus Notes turning 25
To: <aquarianm@gmail.com>
Cc:

  AT&T backs off threat to halt its fiber rollout | Top Cyber Monday tech deals

 
  Network World After Dark  

Groupware hug: Lotus Notes turning 25
This coming Sunday marks the passing of 25 years since the initial release of Lotus Notes, known today as IBM Notes. In marking the 15th anniversary 10 years ago, I spoke with Ray Ozzie about the earliest days of Notes and the subsequent acquisition of Lotus by IBM. Here is a slightly shortened version of that interview.  Do you ever get tired of talking about Notes? That's funny … I don't get tired of talking about it depending on the conversation and which way it's spinning. … I get a chance to surf off of it into my current passions and what I'm talking about now and I hope it doesn't sound like the song that nobody wants to hear. I'm passionate about computer-supported cooperative work, writ large. I hope when people are asking about Lotus Notes that that is really what they're talking about.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Binary Tree
 
SMART: Best Practices for Migrating the Corporate Directory
A cornerstone of any IT infrastructure, Microsoft Active Directory plays a central role, determining access to and usage rights for IT resources. Migrating AD to a new environment must be planned and managed carefully using best practices, while maintaining operations and user functionality. Learn More

WHITE PAPER: BMC Software
 
The New IT
  Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now. Learn More

AT&T backs off threat to halt its fiber rollout
  AT&T now says it will continue its already-announced fiber optic network expansion to 100 cities, backtracking on comments by AT&T CEO Randall Stephenson after President Obama voiced support for net neutrality last month.The move brought a strong retort from critics who say the carrier's fiber optic plans are mostly bogus and were designed as a competitive play against the ongoing Google Fiber rollout. The purported delay in AT&T's investments was quickly seen as an empty threat.In a letter to the Federal Communications Commission (FCC) sent Nov. 25, AT&T said won't limit future fiber-to-the-premises deployments to 2 million homes as part of its $49 billion deal to acquire DirecTV. That contrasts with what Stephenson said Nov. 12.To read this article in full or to leave a comment, please click here Read More
 

Top Cyber Monday tech deals
While Cyber Monday has long taken a back seat to the holiday shopping tsunami that is Black Friday, this year things may be different -- especially since some sale prices on the Monday after Thanksgiving could be better than day-after-Thanksgiving deals."Cyber Monday brings savings that are 10% - 14% better than Black Friday," claims "deal journalist" Matt Granite, who hosts the Ways to Save segment aired on Gannett-owned local TV stations. "That's based on my findings from last year and the trends we expect this year. Obviously there will be exceptions, but this is my prediction for many major categories."To read this article in full or to leave a comment, please click here Read More
 

Report: Hacker group FIN4 stealing insider info to exploit significant changes in stock prices
For more than a year attackers dubbed FIN4 have been stealing insider information that could affect stock prices by hacking email accounts of key corporate executives and others privy to sensitive deals, according to a report by security vendor FireEye.FIN4 has been in operation since mid-2013, targeting mainly healthcare and pharmaceutical companies and their advisers, such as law firms, investor-relations consultancies and investment banks, the report says.+ Also on Network World: Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users |Hack the halls: Watch out for Cyber Monday scamathon +To read this article in full or to leave a comment, please click here Read More
 

Microsoft buys Acompli to enhance Outlook for iOS, Android
Setting the stage for advanced Office mail functionality on non-Windows platforms, Microsoft has acquired Acompli, a startup that provides software for organizing email on mobile devices."Our goal is to deliver fantastic cross-platform apps that support the variety of email services people use today and help them accomplish more," wrote Rajesh Jha, Microsoft corporate vice president for Outlook and Office 365, in a blog post announcing the purchase.Over the past year, Microsoft has been extending its Office set of office productivity software and services so they can be accessed on non-Windows devices. The company has released Office apps for the iPad and iPhone, and is working on a version of Office for Android.To read this article in full or to leave a comment, please click here Read More
 

Apple faces trial in decade-old iTunes DRM lawsuit
The past is coming back to haunt Apple, as a nearly 10-year-old class-action antitrust lawsuit accusing the company of trying to monopolize online music distribution is headed to trial.The Apple iPod iTunes antitrust litigation accuses Apple of violating U.S. and California antitrust law by restricting music purchased on iTunes from being played on devices other than iPods and by not allowing iPods to play music purchased on other digital music services.Late Apple founder Steve Jobs will reportedly appear via a videotaped statement during the trial, scheduled to begin Tuesday morning in U.S. District Court for the Northern District of California.To read this article in full or to leave a comment, please click here Read More
 

The Linux desktop-a-week review: Android as a desktop environment
Last week, I reviewed ChromeOS from a desktop environment perspective as part of my "Linux Desktop-a-Week" series (which, really, has become less of a weekly thing and more of a "Desktop-Every-Few-Weeks-Or-So" thing. But I'm sticking to my original title. Because I'm stubborn).This "week," I am spending time with another Linux desktop environment that isn't exactly traditional. This week, I'm using Android.See also: The Linux desktop-a-week review: ChromeOS There are a lot of things I could say about Android as a platform. I could talk market share or application selection, diversity of hardware or maturity of the SDK. But I'm not going to touch on any of that, at least not in this article. Instead, I am going to focus strictly on Android as a desktop environment.To read this article in full or to leave a comment, please click here Read More
 

Competition in the container market has begun
Thus far in the container world there has been one big player: Docker. But not for long. Today startup CoreOS announced that it has released the earliest version of a Docker competitor named Rocket. And so the container wars have begun. Christian Draghici CoreOS is ready to give Docker a fight in the container market. Check out CoreOS's announcement of Rocket, which has some zings targeted directly as the Docker community. That's nothing new though. The cloud computing and devops markets have been known for their rough and tumble marketing and power play moves by vendors. Check out the brewing PaaS battles or the cloud price wars among the IaaS megavendors.To read this article in full or to leave a comment, please click here Read More
 

Do you create stupid users?
Most security awareness failings are actually failings of security programs.A week doesn't go by where we read about some attack that is precipitated by bad user actions. At a specious level, it appears that it is another case of a stupid user doing something that they have been told time and time again not to do. Clicking on phishing messages are one example of that.MORE ON NETWORK WORLD: Free security tools you should try However, when I hear the stories, I always ask myself what could have been done differently on the part of the organization? Why was the user put in the situation in the first place? Was the awareness training good enough? When the user took their action, could the system have warned the user? Could the systems have stopped the damage caused? Were there multiple phases of the attack that could have warned the organization that the user might be targeted? Again, there are a lot of questions.To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Data analytics scores marketing wins for the Texas Rangers
When it comes to convincing your boss of the value of a data dashboard, nothing works better than when you can save money as a result of a trend that you visualized. This is what Sarah Stone, one of the data-driven marketing staff, did for the Texas Rangers baseball team; her dashboard saved about $45,000 in annual costs.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

 

SLIDESHOWS

14 go-to tools for Mac sysadmins

Mac pro Gerard Allen shares his must-have sysadmin tools for enterprise Apple deployments.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 10 productivity gadgets to add to your holiday shopping list

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

4. Pi, translated: The evolution of Raspberry Pi

5. 11 technologies Apple has killed

6. SDN tools increase WAN efficiency

7. 9 Common Spanning Tree Mistakes

8. Gamification pitfalls and how companies are avoiding them

9. Black Friday sales promise iPhone 6 deals

10. New products of the week 12.01.2014


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment