Search This Blog

Friday, February 22, 2013

What to expect from the world’s biggest mobile show – MWC 2013

How Arista Networks got out in front of the SDN craze

Office 2013 sentenced to death by licensing

Network World Daily News PM
February 22, 2013
Share this email

What to expect from the world's biggest mobile show – MWC 2013

Smartphones, smart chips, mobile browsers and augmented reality will be reality at Mobile World Congress in Barcelona

READ MORE
 

Issue highlights

1. INSIDER How Arista Networks got out in front of the SDN craze

2. Office 2013 sentenced to death by licensing

3. Google confirms high-end Chromebook Pixel, surprising some

4. Is it now crazy to offshore IT to China?

5. Apple now working with the NYPD to curb iPhone thefts

6. HP's first 'Project Moonshot' server due next quarter

7. Linux profitability: How successful are the companies behind the biggest distros?

8. RSA Security Conference 2013: The Most Important RSA Ever?

9. Google fixes 22 flaws in Chrome, slams silent add-ons

10. Zendesk says breach compromised email addresses

11. Android lock screen widgets: 20 excellent options

RESOURCE COMPLIMENTS OF: BlackBerry

BlackBerry for business. Built to keep your business moving.

Help employees make the most of business opportunities with BlackBerry smartphones powered by BlackBerry® 10. BlackBerry 10 features & apps work together seamlessly to deliver the ultimate end user experience. With BlackBerry® Enterprise Service 10, easily deploy, manage, secure & control BYOD & corporate devices to truly mobilize your business. Learn more about BlackBerry Enterprise Service 10 >

INSIDER

How Arista Networks got out in front of the SDN craze

n this installment of the IDG Enterprise CEO Interview Series, Arista Networks CEO Jayshree Ullal spoke with Chief Content Officer John Gallant about the reality and hype around SDN, and why the data center requires a different network than your father's general-purpose Cisco net. She also explored how her work at Cisco shaped Arista's strategy, and shared insights on how Arista's partnerships with VMware and Cloudera are making it easier to move to cloud and embrace big data, respectively. READ MORE

Office 2013 sentenced to death by licensing

I've documented a few times how I feel Microsoft is attempting to control end-user behavior – from killing the Start button in Windows 8 to blocking used games from working on the Xbox 360 successor – and from what I've read about the end-user license agreement (EULA) for Office 2013, the trend is continuing. READ MORE

WHITE PAPER: Meraki

Integrating the iPad into Enterprise Wireless

Network administrators need to be prepared to support the ever-growing number of tablets and other mobile devices on enterprise wireless networks. This whitepaper shows how to survive the iPad crush with a detailed look at the challenges of supporting mobile devices and BYOD initiatives. Learn More!

Google confirms high-end Chromebook Pixel, surprising some

Google's Chromebook Pixel went up for sale on the Play store on Thursday, to the surprise of some industry observers who had expressed doubts over earlier rumors that the device was on the way. READ MORE

WHITE PAPER: AccelOps

Enabling Efficient Data Center Monitoring

Enabling Efficient Data Center Monitoring -- How IT Organizations See the Big Picture of Their Infrastructure Using AccelOps' Unified SIEM, Performance and Availability Monitoring Software. Read Now

Is it now crazy to offshore IT to China?

China has been developing an IT outsourcing industry aimed at bringing in business from the U.S. and Europe. It has succeeded, but then again it hasn't thrived and now may face more barriers. READ MORE

WHITE PAPER: Symantec

Is Online Backup Right For Your Business?

Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now!

Apple now working with the NYPD to curb iPhone thefts

Back in late 2012, New York City Mayor Michael Bloomberg attributed the increase in statistical city-wide crime to Apple, noting that thieves had a propensity to target folks using iPhones and iPads. As an illustration of the problem, there were 3,890 more Apple product thefts than in 2012 than there were in 2011. READ MORE

HP's first 'Project Moonshot' server due next quarter

Hewlett-Packard's first low-power server for hyperscale computing environments, developed under a project it calls Moonshot, will go on sale next quarter, CEO Meg Whitman said on Thursday. READ MORE

Linux profitability: How successful are the companies behind the biggest distros?

It's hard to put a number on success. How much money does a technology company need to make in order to be considered successful? On the Linux side of things there are (for many) three "big dogs" that we tend to think of: Canonical (Ubuntu), Red Hat (Fedora) and SUSE LLC (SUSE). Let's take a look at how each of these companies are doing financially. RELATED: How removing 386 support in Linux will... READ MORE

RSA Security Conference 2013: The Most Important RSA Ever?

It wasn't long ago that the annual RSA Security Conference was an oasis from mainstream IT. While CIOs were focused on business process automation, the RSA crowd was celebrating technologies like DLP, web security, and key management. Yup, security was an under-funded IT step child and the RSA Conference was still centered on bits and bytes. That was then, this is now and cybersecurity is everywhere... READ MORE

Google fixes 22 flaws in Chrome, slams silent add-ons

Google yesterday released Chrome 25, patching 22 vulnerabilities and debuting a new security feature that blocks silent installations of add-ons. READ MORE

Zendesk says breach compromised email addresses

Zendesk said Thursday a hacker gained access to support information for some customers of its online help desk software. READ MORE

Android lock screen widgets: 20 excellent options

Android 4.2 lets you put widgets on your lock screen -- so which apps make the most of the feature? Computerworld rounds up 20 of the best. READ MORE

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Why Android 4.2.2 is an important update

2. Impressive HTC One should prove stiff competition for Galaxy S IV

3. How Colorado's CISO is revamping the state's information security

4. U.S. students get cracking on Chinese malware code

5. Cisco, EMC coalition expands data center portfolio

6. Microsoft Azure overtakes Amazon's cloud in performance test

7. Petition to legalize cell-phone unlocking tops 100,000 signatures

8. Cisco, Avaya feel the heat from Microsoft Lync

9. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet

10. Cisco declares war on Microsoft unified communications system

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: