Tuesday, May 15, 2012

Is your BYOD policy out-of-date?

Network World's products of the week 5.14.12 | Just months after failed AT&T merger, T-Mobile now champions competitive balance

Network World Daily News AM

Forward this to a Friend >>>


Is your BYOD policy out-of-date?
As consumerization continues to spread throughout the enterprise, IT decision makers must remain on their toes, tracking and anticipating end user behavior and deploying technology to protect against productivity losses and data breaches, one researcher says. Read More


RESOURCE COMPLIMENTS OF: Mitel

Virtualized voice: real benefit or illusion?
Does integrating your voice applications into your virtual data center sound like magic? Find out how companies of all sizes are realizing the cost benefits and simplified disaster recovery of unified virtualized voice and data. Learn why Mitel received VMware's prestigious Technology Innovator Partner of the Year award. It's not Magic. It's Mitel. Get in on the Voice Virtualization Act!

WHITE PAPER: Quest Software

Exchange 2010 and Your Audit Strategy
In this Quest Software white paper, discover how to easily understand and control who accesses your company's sensitive data. Learn to implement a strong Exchange 2010 audit strategy, and read about the options that give you the power to safeguard your company's vital information. Read it today. Read Now!

Network World's products of the week 5.14.12
Our roundup of intriguing new products. Read More

Just months after failed AT&T merger, T-Mobile now champions competitive balance
Given its very recent attempts to merge with AT&T, you would think T-Mobile wouldn't be a vocal proponent of maintaining competitive balance in the wireless industry. Read More

Are iPhone 5 rumors torpedoing Apple's Q2 revenues?
Apple (AAPL - NASDAQ) is warning investors that returns for the current second quarter will be lower than projections, triggering widespread and feverish speculation that the fall-off is due to swirling rumors about an early summer launch for iPhone 5. Read More

Intel incorporates security, management into Core vPro processors
Intel today described management and security capabilities that will be part of its new Intel Core vPro processor family used in PCs, tablets, laptops and intelligent systems. Read More


WEBCAST: IBM

Accelerate Document Processing and Wow Your Customers
Learn how intelligent imaging and BPM solutions, coupled with pragmatic best practices and methodology, can improve productivity, lower cost, increase accuracy, reduce cycle times and lower overall risk. Learn More

12 Tips to Cut Your Cell Phone Bill
See that cell phone next to you? Unfortunately, you're paying too much money for it--every month. If overpaying for what you need sounds like a bad idea to you, stop doing it. We've assembled 12 simple actions that you can take to reduce your cell phone bill, so that some of the cash you now spend for service--maybe even half of it--remains in your possession. So check out our tips, and use one or more of them to save big bucks on your bill. Read More

SMS a killer app at 20; irrelevant at 25?
The first SMS-capable mobile phones were approved for sale in Europe 20 years ago this month. By any measure, SMS has become a huge success, at least for the telephone companies, with more than 6 trillion SMS messages sent worldwide in 2010, generating more than $110 billion in revenue. But the future may not be anywhere near as bright because of increasing use of "free" Internet-based services such as Facebook, Apple's iMessage and WhatsApp.com. Read More

Apple dominates other smartphone vendors in consumer satisfaction
The latest American Customer Satisfaction Index has found, not surprisingly, that people really like their iPhones. Read More

Levinsohn takes on CEO role at struggling Yahoo
Just one day into the job, Yahoo's interim CEO Ross Levinsohn is in charge of a company struggling with administrative chaos, industry position and growing competitors. Read More


WHITE PAPER: Dell

High-availability virtualization with Dell PowerEdge servers
Dell 3-2-1 Reference Configurations help companies simplify the design, ordering and deployment of a highly available virtualized infrastructure. This proven architecture is comprised of three servers, two switches and one storage array, plus the software you'll need to manage the environment to support over 500 users. Learn More

Hackers break into bitcoin exchange site Bitcoinica, steal $90,000 in bitcoins
Bitcoin exchange site Bitcoinica suspended its operations on Friday after hackers managed to steal 18,547 bitcoins -- valued at about US$90,000 -- from its online wallet. Read More

Apple releases security update, Flashback removal tool for Leopard
If you still cling to Leopard like I cling to 80s music, good news: Just as I haven't forgotten Right Said Fred, Apple hasn't forgotten you. The company on Monday released a pair of security updates for the older operating system: Leopard Security Update 2012-003 and Flashback Removal Security Update. Read More

INSIDER
Survey: BYOD sparks enterprise investment in Unified Communication and Collaboration
The 2012 IDG Enterprise Unified Communications and Collaboration (UC&C) survey was completed with the goal of gaining a better understanding of current and future UC&C investments. The survey highlights the uptick in UC&C adoption and investments in the coming three years — specifically in enterprise organizations — demonstrating the value organizations place on technologies that enable consistent and connected communications between employees, customers and partners. Read More

Cybersecurity Roundup: Hackers Target Gas Firms; Twitter-Spammer Logins Leaked; and More
This week's cybersecurity news roundup features a US ICS-CERT warning about a "spear phishing" campaign aimed at natural-gas pipeline companies; Twitter spammers' logins exposed; a University of North Carolina data breach; and more. Read More



SLIDESHOWS

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Researcher runs IP network over xylophones
  2. How to make Android faster, more productive and more secure than iPhone
  3. iPhone 5 with 4-inch screen may not be a sure thing
  4. Adobe backpedals, will now patch software for free
  5. iPhone 5 rumor rollup for the week ending May 11
  6. Largest Illinois healthcare system uproots Cisco to build $40M private cloud
  7. FBI issues warning on hotel Internet connections
  8. Cisco's not on board, but is Shortest Path Bridging winning?
  9. Computing fossils: Old tech holding on for dear life
  10. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: