Thursday, December 17, 2009

10 best Chrome extensions for work and play; Augmented reality on mobile devices: a new way of seeing

Augmented reality on mobile devices: a new way of seeing, and being?; Open source, Linux set for unheralded coronation in 2010
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Customers Share their experiences with IBM and Cloud Computing
The IBM cloud computing infrastructure, Architecture and information management are designed to help you sustain ongoing cost reduction while improving service levels over the long term.

Learn More Now

rule

Spotlight Story
The 10 best Chrome extensions for work and play

Some of these add-ons for Google's browser will boost productivity and some are just plain fun. Read full story

Related News:

Augmented reality on mobile devices: a new way of seeing, and being?
Augmented reality is a coalescing of technologies that promises to create a new interactive relationship between mobile users and their surroundings. It's easy to make AR sound like the latest technology in search of an application, but an analogy with jet fighter pilots might help.

Open source, Linux set for unheralded coronation in 2010
Arguably the biggest prediction for 2010 around open source and Linux is that most end-users likely won't even talk about it or even think about it. But that won't be a death knell; it's a coronation.

IT departments need right skills to recover in 2010
Certain IT skills will help carry companies through the recession to a better economic climate – and business leaders are counting on that.

Adtran extends Carrier Ethernet line
Adtran this week added three routers to its Carrier Ethernet portfolio.

Intel and antitrust: A brief history
The Federal Trade Commission's antitrust lawsuit against Intel marks the latest development in one of several antitrust cases that have dogged the world's largest chip maker for years. Here's a rundown of Intel's brushes with antitrust investigators and lawsuits around the world since 1990.

via Twitter: No seriously, "Operation Chokehold" is incredibly stupid
My favorite response, via Twitter today, to Fake Steve Jobs' "Operation Chokehold" scheme -- do lots of data-intensive things on your iPhone to bring AT&T's wireless network to it's knees for awhile -- is by Rich Brome, of phonescoop.com:"No seriously, 'Operation Chokehold' is incredibly stupid. What happens when someone dies because they can't reach 911 that hour?"

Enterprise spending down in double digits this year, up next
Spending in the combined enterprise networking and storage markets will decline 16.6% in 2009, according to Oppenheimer & Co. The firm expects double-digit year-over-year declines in all enterprise spending layers in 2009 as well.

IBM buying BPM vendor Lombardi
IBM on Wednesday said it has signed a deal to buy Lombardi, an Austin, Texas, BPM (business process management) vendor. Terms were not disclosed.

Today from the Subnet communities

On Cisco Subnet: Top 10 areas that CIOs needs to focus on for 2010 and VARs lining up for UCS, VBlock; On Microsoft Subnet Microsoft admits it copied Plurk, shuts down Juku: On Google Subnet: 10 best Chrome extensions

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


 

December 17, 2009

MOST-READ STORIES

  1. Bank's antifraud tactics stun security expert
  2. When ISPs turn on meters expect "unexpected" traffic
  3. 10 wacky USB devices
  4. Watch out Microsoft: GNOME is poised to have a killer 2010
  5. Rogue antivirus lurks behind Google Doodle searches
  6. Ethernet switch cheat sheet
  7. Apple's top 10 biggest stories in 2009
  8. Zero-day vulnerability threatens Adobe users
  9. Hackers are defeating tough authentication, Gartner warns
  10. Chinese zodiac accurately predicts yearly cybercrime trends

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure.
Learn More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: