High-tech

High-tech
Light

Friday, April 4, 2014

How Boeing is using the cloud

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Apr 3, 2014 2:53 PM
Subject: How Boeing is using the cloud
To: <aquarianm@gmail.com>
Cc:

12 Biggest Data Breaches of the Last 12 Months

Cisco looks at extending OpFlex

Network World Daily News PM
April 03, 2014
Share this email

How Boeing is using the cloud

There’s a lot of talk about the cloud, but how are businesses really using it?

READ MORE
 

Issue highlights

1. 12 Biggest Data Breaches of the Last 12 Months

2. Cisco looks at extending OpFlex

3. Apple slates WWDC for June 2-6, sets up ticket lottery

4. INSIDER CIOs Predict IT Spending to Increase

5. 10 things we hate about JavaScript

6. Windows Phone Builds some momentum

7. The real reason Brookstone filed for bankruptcy

8. Users face serious threat as hackers take aim at routers, embedded devices

9. Public Wi-Fi speeds to get a boost from Qualcomm's new antenna technology

10. 7 all-in-one security suites: Anti-malware for all your devices

11. FAST LOOK: Windows Phone 8.1

WEBCAST: Oracle

Transforming Finance with Cross-Functional Analytics

Date: May 6th, 2014 Time: 1 PM EDT Attend this Webcast to find out how Oracle’s packaged analytic applications enable line-of-business managers to examine all their business concerns. Learn More

12 Biggest Data Breaches of the Last 12 Months

Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data breach. Here we look at the largest breaches in the last year. READ MORE

Cisco looks at extending OpFlex

Cisco says it is looking into extending its OpFlex policy protocol, unveiled this week at Interop, to legacy platforms such as the Catalyst 6500. READ MORE

Apple slates WWDC for June 2-6, sets up ticket lottery

Apple today announced that its annual developers conference will run June 2-6, and that it's copying Google's method of assigning tickets through a random drawing. READ MORE

WHITE PAPER: HP and Intel® Xeon® processors

HP BladeSystem Leadership and Innovation for Data Centers

In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More

INSIDER

CIOs Predict IT Spending to Increase

Mobile apps and tablets are the areas identified most frequently for investment, according to CIO Research's poll of IT executives. However, analytics, cloud and enterprise security spending aren't far behind. READ MORE

10 things we hate about JavaScript

Endless library reloading, cool tools that piggyback on JavaScript success, spaghetti code -- alert(‘Over it!’) READ MORE

Windows Phone Builds some momentum

Even in the days leading up to the Build conference, it was clear Windows Phone was getting some wind behind its back. Windows Phone has surpassed 400,000 apps and the Windows Store now gets 14 million downloads a day. IBM has sort-of endorsed WP as its mobile OS of choice, although not officially. READ MORE

WHITE PAPER: VCE

Healthcare Firm Ramps Up for Claims Processing Spikes

Virtualizing compute, storage and networks with VCE was the answer for one IT-constrained healthcare organization who was able to: - Migrate applications in just five days (compared to two months previously) - Improve storage and application performance by 25%-40% - Meet stringent state-regulated SLAs - Reduce data center footprint by 75% Learn More

The real reason Brookstone filed for bankruptcy

Well of course Brookstone is filing for bankruptcy. What other outcome might one expect for a company that manages expenses like a drunken retailer? I've seen the evidence myself and even tried to alert the company. From a May 20011 Buzzblog post: READ MORE

Users face serious threat as hackers take aim at routers, embedded devices

Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks. READ MORE

Public Wi-Fi speeds to get a boost from Qualcomm's new antenna technology

Qualcomm has chipsets on the way that use new antenna technology to boost Wi-Fi download speeds in crowded spaces where lots of people are competing for bandwidth. READ MORE

7 all-in-one security suites: Anti-malware for all your devices

Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe. READ MORE

FAST LOOK: Windows Phone 8.1

First major update to Microsoft mobile OS since fall of 2012; includes enterprise IT features READ MORE

WHITE PAPER: ExaGrid

How Data Deduplication Impacts Recovery

Data deduplication has clear benefits when it comes to efficiently retaining backup data on disk and replicating data offsite for disaster recovery – you save both disk space and bandwidth by employing deduplication. Learn More

SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco reveals OpenFlow SDN killer

2. FireEye, AhnLab score low in lab test of breach detection systems

3. The ultimate Windows XP quiz

4. The (mostly) cool history of the IBM mainframe

5. Juniper to lay off more than 500 and close facilities

6. The 10 computer science programs with the biggest payoff

7. How to respond to a data breach

8. Microsoft gives businesses reason to adopt Windows 8.1

9. China's unsupported XP machines hold the potential to become a massive botnet army

10. IE easily beats Chrome, Firefox, Safari in malware detection

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment