Wednesday, May 22, 2013

The 20 best iPhone/iPad games of 2013 so far

Blue Coat Systems to acquire security analytics firm Solera Networks

Lotus F1 CIO on maintaining control of enterprise IT

Network World Daily News PM
May 22, 2013
Share this email

The 20 best iPhone/iPad games of 2013 so far

As we head toward the halfway point of 2013, it's time to check in and see how the mobile gaming industry has fared for Apple iOS platforms, the iPhone and iPad. Here's a look at top rated games issued this year, based on App Store user reviews and professional reviewers on Metacritic. While not all of these are Big Names, we hope you'll discover a few hidden gems.

READ MORE
 

Issue highlights

1. Blue Coat Systems to acquire security analytics firm Solera Networks

2. Lotus F1 CIO on maintaining control of enterprise IT

3. 9 Steps to Build Your Personal Brand (and Your Career)

4. INSIDER Smartphones take center stage in two-factor authentication schemes

5. Samsung's Galaxy S4 infringes on 5 patents, Apple says

6. New Intel CEO creates 'New Devices' division focused on 'cool technology'

7. Will Chinese hackers launch re-tread attacks into surveillance databases?

8. Citrix links cloud-based storage to SharePoint and Azure

9. Jive's Producteev task management app now free for unlimited users

10. 20 milestones in Ethernet's first 40 years

RESOURCE COMPLIMENTS OF: KnowBe4

How big is your 'phishing attack surface'?

Many email addresses of your organization are exposed, allowing cybercriminals to launch spear-phishing attacks. The bigger the attack footprint, the higher your risk. Fill out the form and we'll email you the list of exposed addresses. Sign up for your FREE EEC now

Blue Coat Systems to acquire security analytics firm Solera Networks

Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect potential security threats. READ MORE

Lotus F1 CIO on maintaining control of enterprise IT

Lotus F1 CIO Graeme Hackland CIO believes having an application strategy that allows employees to find and develop their own solutions is key to maintaining control of an enterprise IT environment. READ MORE

9 Steps to Build Your Personal Brand (and Your Career)

Competition in the tech jobs industry is fierce, so how do you differentiate yourself from the pack? Whether you're a job seeker or just looking to grow professionally, creating an impressive and meaningful brand is the best place to start. READ MORE

WHITE PAPER: McAfee

Integrating Single Sign-on Across the Cloud

This white paper discusses some of the issues involved with the integration and federation of identity across the cloud. It also looks at how several McAfee products such as McAfee Web Gateway and McAfee Cloud Single Sign On helps resolve these issues. Read Now

INSIDER

Smartphones take center stage in two-factor authentication schemes

We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install. READ MORE

Samsung's Galaxy S4 infringes on 5 patents, Apple says

Samsung's Galaxy S4 infringes on 5 Apple patents, according to a court filing by Apple. READ MORE

New Intel CEO creates 'New Devices' division focused on 'cool technology'

Well, that didn't take long. A mere five days after Brian Krzanich took the reins as the new CEO of Intel, he's shaking things up at an organizational level. READ MORE

WHITE PAPER: IBM

Powerful Application Solutions for CRM & ERP

This white paper examines how you can get the most from CRM and ERP, find the best system for your business and how IBM can help. Learn More.

Will Chinese hackers launch re-tread attacks into surveillance databases?

At a press conference to announce the new Xbox, Xbox One—which is launching later this year—Microsoft promised that you will "have a relationship with your TV." Part of that relationship will include Skype that is coming to Xbox One. READ MORE

Citrix links cloud-based storage to SharePoint and Azure

Citrix Systems is making its cloud-based storage service ShareFile more Microsoft-friendly with SharePoint integration and the ability to store data on Azure. READ MORE

Jive's Producteev task management app now free for unlimited users

Jive Software has eliminated the limit on the number of people who can use its social task management application Producteev for free within a company. READ MORE

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades READ MORE

WHITE PAPER: Riverbed

IT Consolidation Hazards

Providing central services means more bandwidth between data centers and remote users. This ESG paper highlights new research on IT initiatives, how to avoid the common pitfalls of consolidation, and alternatives to ensure application performance, even for remote and mobile users, does not suffer after an IT consolidation. Read now!

SLIDESHOWS

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Lawyer questions legal ethics of LinkedIn endorsements

2. Dell dumps OpenStack and VMware for public cloud, focuses on private cloud

3. 20 milestones in Ethernet's first 40 years

10. Reporters threatened with CFAA, labeled hackers for finding security holes

8. How VMware will try to shake up the cloud market this week

9. 10 things you may not know about Ethernet

7. What's next for Ethernet?

6. 10 amazing Linux desktop environments you've probably never seen

5. The devious art of cell tower camouflage

4. Smartphones take center stage in two-factor authentication schemes

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: