Search This Blog

Tuesday, June 23, 2009

Nortel had little choice but to liquidate; Android Market: Tear down this wall!

Android Market: Tear Down This Wall!; Beyond WiMax: Intel shows prototypes
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Actuate
rule

Meet Visualization Requirements with Ease
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Register for this Live Webcast scheduled for Wednesday, July 15 at 2:00 p.m. EDT/11:00 a.m. PDT, to learn how. Meet data visualization requirements faster and with less development by making BIRT web output interactive.

rule

Spotlight Story
Nortel had little choice but to liquidate, analysts say

In light of the overall economy and Nortel's particular situation, the former telecom giant had little choice but to liquidate its assets as it attempts to restructure under Chapter 11, analysts say. Read full story

Related News:

Android Market: Tear Down This Wall!
Perhaps the weakest link in the Android chain is the Android Market. Frankly, it is uninspiring: limited searching, limited descriptions, limited dialogue between developers and customers, limited customer service to developers from the Market managers. Moreover, since it is proprietary and closed up tight as a clamshell, there is no effective way for the community to help make the Market better.

Beyond WiMax: Intel shows prototypes
Intel displayed prototypes for the next generation of wireless standards that will come after WiMax.

Layoffs are increasing demand for tech freelancers
Analysts say the fast growing demand for contract technology workers doesn't indicate that the economy is turning around -- yet.

10Gbit Ethernet heats up
You might ask what 10G Ethernet has to do with storage. There's an obvious connection now with storage vendor QLogic getting into the game.

Ubiquisys adds speedier femtocell
Ubiquisys said Monday that it is aiming for a fourth quarter release of consumer and business versions of its next-generation femtocell, the G3, designed to offer mobile broadband download speeds up to 21.6M bps (bits per second).

Heartland Commended for Breach Response
Heartland Payment Systems CEO Robert Carr has made several moves to address security following the massive data breach at his payment processing company earlier this year.

Convergence Comes to the BlackBerry
Agito Networks today announced that they've ported their mobile/mobile unified communications (convergence) client to the BlackBerry. This is a quite an achievement - the various editions of the BlackBerry constitute for many the very definition of a mobile enterprise communicator, and it will remain an important platform for the foreseeable future.

Intel works on smarter traffic lights
Intel is doing its part to enrich the driving experience, developing in-car embedded PCs based on its Atom processor. But the company's doing something even more interesting with traffic lights.

Quick-Cloning a Hard Drive
I recently had occasion to upgrade a system drive on a simple server box (no fancy RAID arrays) to a new drive with much higher capacity, lower power consumption, and lower noise.

Disaster Planning: Before, During and After
Disaster preparation isn't just about coming up with a plan beforehand (although that helps a lot). It's the preparation and action that takes place during and after an event as well. Keith Shaw talks with Roland Etcheverry, VP and CIO of Champion Technologies, about the key steps of disaster preparation for IT groups. (18:27)

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


VMware's vSphere reviewed
vSphereWe found 5 things to love and 5 things to hate about VMware's vSphere.

Take the quiz
IT quizAre you a net know-it-all? Prove it.

Top 10 Tips for Protecting, Securing SMB Data
Statistics show the typical small business will experience a disruptive event lasting more than 24 hours once every three years. Achieve peace of mind and greater efficiency: Download this whitepaper today and quickly discover the Top 10 best practices for securing SMB business data and ensuring quick recovery.
Read More


 

June 23, 2009

TOP STORIES | MOST DUGG STORIES

  1. Google grabs 1 million phone numbers for Google Voice
  2. Want a city job? Fork over your usernames, passwords
  3. University flees fire with network in a box
  4. First FMC support for BlackBerry arrives
  5. What is a router?
  6. Could Opera Unite be a botmaster's best friend?
  7. Nine Ball attack strikes 40,000 Web sites
  8. Weighing the pros/cons of desktop virtualization
  9. Microsoft backtracks, extends XP availability to 2011
  10. M&A rumors include Cisco, Juniper

How to Get Ahead of Web App Security Threats
If you rely on Web applications to support any part of your business, it's time to take control of your application security. Download this whitepaper today and discover how to examine your existing security practices and get the recommendations you need to protect your enterprise from a breach.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: