Найденные страницы с тегом theme всего 13881

Platform theme emerges with SharePoint 2010 | Network World

SharePoint 2010 is looking a lot less like a traditional infrastructure server and more and more like a platform that offers IT and developers a foundation that can be extended in a myriad of directions.

Rovio teaming with disputed Chinese Angry Birds park | Network World

Angry Birds publisher Rovio is seeking to cash in on a Chinese theme park that has created a real-life Angry Birds game without the company's permission.

Twitter vs TechCrunch: Heads in the clouds and elsewhere | Network World

Whenever Michael Arrington posts anything on TechCrunch with a theme of "Ethics 101," you know you're in for some unintentional high comedy. Such was the case today when someone calling himself "Hacker Croll" dumped a carton of internal Twitter documents on TechCrunch's doorstep.

Automation, Integration Key to Fighting Cyber Crooks | Network World

A familiar theme is taking shape at this year's RSA security conference: With cyber cooks growing more clever and insidious, security vendors who compete with one another have no choice but to come together to fight a common enemy.

High-tech amusement park keeps special-needs guests connected | Network World

Morgan's Wonderland hosts thousands of special-needs children, adults and their families. Each guest at the San Antonio theme park wears an RFID wristband for location tracking and to link to critical personal information, such as medical conditions and allergies.

OpenFlow and SDN: Networking’s future? | Network World

The future of networking will be defined by software. That was the overriding theme after the first day of the inaugural Open Networking Summit, a conference dedicated to software-defined networking (SDN)and OpenFlow, the open source API defined to enable multivendor switches and routers to be programmable.

Two new security books ponder: Just how vulnerable are we? | Network World

Two recently-published books, "America the Vulnerable" by Joel Brenner, a former official at the National Security Agency (NSA) and "When Gadgets Betray Us," by writer and security analyst Robert Vamosi, have one theme in common: We've come to depend on modern networks and technology, but the compromise of them by attackers is a serious threat to both individuals and society as a whole.

Wi-Fi, small cells could disrupt mobile | Network World

The rise of mixed mobile networks of Wi-Fi, small cells and traditional base stations, a major theme of this week's Mobile World Congress in Barcelona, may change the competitive landscape of both service providers and equipment vendors.

The mobile app developer’s dilemma: How to get paid without annoying users | Network World

If there was one common theme among the app developers speaking at Xconomy's Mobile Madness program today, it was this: Don't take your users for granted.

Ethernet services market blossoms | Network World

Last time, we looked at equipment market data from the Dell'Oro Group. In keeping with that theme, this time let's look at some data on another aspect of the industry: Business Ethernet Services.

Knowing things need to change is only half the battle | Network World

This year's CIO 100 Symposium was exceptional. The speakers were smart, experienced and engaging, and they offered solid takeaways to the 250-plus IT executives filling the International Center at The Broadmoor in Colorado Springs. While they covered many topics, one theme in particular ran through the two days, sending a strong message about how to move the needle in your business and your life:

Do enterprise security teams want “Big Data Security”? | Network World

A big theme at the RSA Conference this year is a concept known as Big Data Security -- the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insiders and stealthy attacks aimed at stealing sensitive data.

Highlights from VoiceCon Spring 2007 | Network World

Larry had the chance to attend VoiceCon Spring 2007 in Orlando last week. Unlike many of the past shows that seemed to have a central theme espoused by the exhibitors and keynote speakers, this time the messages and news were widespread — something we attribute to the maturing VoIP industry.

ID mgmt. projects: Getting by-in from the stakeholders | Network World

The benefit of, or even the need for, roles was a major theme at last week's Converge conference, which Courion puts on annually for its customers and partners. What was most fascinating to me, though, was the strong undercurrent to the presentations at the previous Converge events I've attended - as well as at most identity management related events I've been to in the past few years - getting corporate buy-in.

Keeping your network clean with AJAX | Network World

A new theme at this year's Interop New York conference a couple weeks back was Web 2.0 applications and tools such as blogs, wikis, RSS feeds and AJAX. The conference highlighted how the technologies can help businesses be more productive by implementing these types of applications that enable more application logic to reside on the client and less to live on the server alone.

Competition heats up for Internet services, broadband access customers | Network World

Today, we highlight another three unrelated stories that have a common theme -it seems that everybody is still trying to get into everybody else's business. Or perhaps, if we look beyond the surface, they are just trying to expand what seems to be a natural reach into their existing customer base.

Are you a good fit for the job? | Network World

In a newsletter a couple of weeks ago, we discussed what hiring managers look for in an ideal candidate, and one consideration that was mentioned was cultural fit - would the candidate fit in well with the company and the rest of the team? James Del Monte, president of Houston staffing firm JDA Professional Services was one of the hiring execs who mentioned cultural fit in the newsletter, and he recently wrote in to expand on the theme.

The quality of an outsourced job is still your responsibility | Network World

Twice before, I have written about how you can outsource IT work, but not the responsibility. The first time, I focused on general security aspects in outsourcing and the second time I focused specifically on data security. This week, I want to revisit that theme, but focus more on the responsibility for the outcome of the work and ownership of the process generally.

Analytics on the go | Network World

Business intelligence technology has been getting a lot of attention lately. Announcements from a few different vendors share one common theme -- getting relevant analysis tools quickly and easily into the hands of more employees, as opposed to a few select power users.

Still looking for a definition for ‘role’ | Network World

A recurring theme in this newsletter is the search for an ontology of identity management - finding the right vocabulary so that we can agree on the terms and their meanings, and talk about the interesting stuff. Those of you who follow my musings at either The Virtual Quill or A Journal of Identity Management may have noticed a "discussion" going on recently over the very word "identity" and its offspring, "digital identity." But that's not the term I want to talk about today.

When it’s OK to use NAC endpoint checking sporadically | Network World

A recurring theme among NAC customers is they use NAC endpoint checking sporadically. When a computer has been scanned and found compliant once, it is designated good to connect to the network for an extended period of time - a month is the timeframe that keeps coming up.

The state of the mobile unified communications market | Network World

Keeping with our theme from last week on unified communications, today we'd like to announce the availability of the "2007-2008 Mobile Unified Communications State-of-the-Market Report" written by Peter Brockmann and Steven Taylor. (Yes, the same Steve whose picture appears to the left of this paragraph.) The report, available here for free, reviews the drivers, challenges and 12-month action plans of over 250 users, recommenders and others involved in the purchase and implementation of mobile unified comm

Super Patch Week | Network World

The presidential primary season has "Super Tuesday" when dozens of states hold their elections simultaneously. In the world of security updates, this could be considered "Super Patch Week" with new updates from Cisco, Apple, Oracle, IBM and numerous Linux vendors. Plus, Microsoft is chiming with a warning of a new Excel flaw and the pesky Storm Worm is taking on a Valentine's Day theme.

Malware on the desktop and mobile device | Network World

A new virus making the rounds is designed to get users to download fake antivirus software, resulting in a further infestation. The MonaRonaDona virus uses social engineering techniques to spread. If that's not enough of a headache, the Storm worm - relatively dormant since Valentine's Day - is making a comeback, this time with an e-greeting card theme. And it's not just desktop users that need to worry, F-Secure this week detected a new Trojan targeting Windows Mobile users.

Malware on the desktop and mobile device | Network World

A new virus making the rounds is designed to get users to download fake antivirus software, resulting in a further infestation. The MonaRonaDona virus uses social engineering techniques to spread. If that's not enough of a headache, the Storm worm - relatively dormant since Valentine's Day - is making a comeback, this time with an e-greeting card theme. And it's not just desktop users that need to worry, F-Secure this week detected a new Trojan targeting Windows Mobile users.