Thursday, August 22, 2013

Data glitch halts NASDAQ trading

Top 10 boozy mobile apps

5 steps Microsoft can take to beef up Windows Phone 8 market share

Network World Daily News PM
August 22, 2013
Share this email

Data glitch halts NASDAQ trading

All trading on the NASDAQ market was halted on Thursday due to a glitch in a system used to disseminate trading information.

READ MORE
 

Issue highlights

1. Top 10 boozy mobile apps

2. 5 steps Microsoft can take to beef up Windows Phone 8 market share

3. INSIDER How Analytics Tools Measure a Corporate Turnaround

4. Sinofsky captivated by Andreessen Horowitz, becomes board partner

5. Assessing BlackBerry CEO's July 2012 Predictions of Success

6. 4G: The new enterprise network

7. Popular download management program has hidden DDoS component, researchers say

8. When it comes to troubleshooting and threat detection, NetFlow wins over packet capture

9. 10 Free Google Chrome Extensions to Increase Your Productivity

WHITE PAPER: Dimension Data

Dimension Data's 2013 Network Barometer Report

The Network Barometer Report provides in-depth insight into the trends, behaviors and drivers in network management. It is an annual aggregation and analysis of the data and knowledge collected from Technology Lifecycle Management Assessments. Learn More.

Top 10 boozy mobile apps

Drink smarter with our thirst-quenching selection of adult-beverage-related apps. READ MORE

5 steps Microsoft can take to beef up Windows Phone 8 market share

Windows Phone is gaining momentum. Now Microsoft has to capitalize. READ MORE

INSIDER

How Analytics Tools Measure a Corporate Turnaround

SAP's HANA database and other tools power an executive dashboard at struggling medical device maker Boston Scientific READ MORE

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue

For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Sinofsky captivated by Andreessen Horowitz, becomes board partner

Steven Sinofsky, who exited Microsoft abruptly weeks after his Windows 8 brainchild shipped, has found a new gig at venture capital firm Andreessen Horowitz. READ MORE

Assessing BlackBerry CEO's July 2012 Predictions of Success

In July 2012, I had a long, thoughtful chat with BlackBerry CEO Thorsten Heins about everything BlackBerry. Our conversation came at a crucial time for the company. The BlackBerry 10 OS had already been delayed multiple times, the company was at the center of endless doom-and-gloom rumors and Heins, who took on the chief executive reins just six months earlier, had a whole lot to prove. (Read the full Q&A with Heins here.) READ MORE

4G: The new enterprise network

Adding 4G infrastructure has its own pain points, including getting coverage everywhere you need it. Three early adopters share their experiences and lessons learned. READ MORE

WEBCAST: Riverbed Technology

New Tools for Virtualization

In this webcast, Riverbed Technology's Paul Wallace will discuss how you can integrate your ADC platform with automated provisioning and capacity management, using new tools for software-defined application delivery. Watch Now

Popular download management program has hidden DDoS component, researchers say

Recent versions of Orbit Downloader, a popular Windows program for downloading embedded media content and other types of files from websites, turns computers into bots and uses them to launch distributed denial-of-service (DDoS) attacks, according to security researchers. READ MORE

When it comes to troubleshooting and threat detection, NetFlow wins over packet capture

With Internet connections to cloud services growing rapidly and cyber attacks becoming craftier and more sinister, the need for improved traffic visibility is in high demand. In the past, both layer 7 application awareness and malware detection capabilities have been major separators when choosing between flow capture and packet capture for traffic analysis, but today the decision is most often NetFlow in lieu of packet capture. READ MORE

10 Free Google Chrome Extensions to Increase Your Productivity

These Google Chrome browser extensions will help you manage tabs, avoid Flash, save files to Google Drive and more. READ MORE

WHITE PAPER: Verizon

Secure, Stable Cloud Computing

Business-critical applications in the cloud require the highest level of multilayered security. Learn how Terremark's secure, advanced data centers and clustered grid architecture provide the redundancy needed to keep critical systems up when hardware goes down while also providing monitoring, backups, patching and incident management. Learn More

SLIDESHOWS

Celebrating Unix heroes

This presentation features the early Unix pioneers and their contributions to the computer industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Here's what can happen at Rackspace when it's your birthday

2. CCIE turns 20: How Cisco transformed itself and the IT world

3. The last days of Unix

4. 5 steps Microsoft can take to beef up Windows Phone 8 market share

5. Can the U.S. Postal Service find a future running a gov't cloud-based authentication service?

6. iPad 5 rumor rollup for the week ending Aug. 20

7. 7 IT security skills certifications on the rise

8. Next up for WiFi

9. Attackers use Ramnit malware to target Steam users

10. 5 big things to watch for at VMworld

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: