MUST READ RELATED • iPad Mini Tablet: Visual Tour• Windows Phone 8: 5 BYOD Considerations Windows 8 Security Improvements Carry Caveats Many new Windows 8 security features were previously available standalone, or require businesses to buy in to Microsoft's server and cloud vision. Hackers Hit Symantec, ImageShack, But Not PayPal Despite threats, Anonymous did not take down Facebook or Zynga on Monday. But other hackers detailed their own exploits, releasing employee credentials and source code. MobileIron Brings VPN-Like Tunnels To Mobile Security AppConnect and AppTunnel aim to help IT secure business apps while keeping them separate from personal content in a BYOD environment. LinkedIn: How To Take Advantage of Recent Changes LinkedIn understands the value of a business conversation. Consider these tips to make sure you're part of it. Social Business Leader Cemex Keeps Ideas Flowing Under pressure to operate more efficiently after the housing bust, Cemex used social collaboration to connect its worldwide employees. One result: Products get to market faster. OpenStack Fights Cloud Lock-In Worries Jonathan Bryce, new OpenStack Foundation executive director, explains how the cloud project takes a democratic approach to win support for its open source work. M2M In The Enterprise: Still 'The First Inning'Enterprises are interested in machine-to-machine data with CRM/ERP systems, but not yet ready to implement, survey says.
| || | DOWNLOAD NETWORK COMPUTING'S LATEST DIGITAL ISSUE From SDN to network overlays, emerging technologies promise to reshape the data center for the age of virtualization. Also in the new, all-digital issue of Network Computing: Open Compute rethinks server design. DOWNLOAD NOW FREE (Registration Required) | |
REPORTS & WHITEPAPERS
FEATURED WHITEPAPERS BYOD: Policy Template BYOD. It doesn't have to be a four-letter word. For many of us, Bring Your Own Device can be both loved and hated. Use this "go-to" policy checklist as a starting point for helping you secure and manage your BYOD environment while enabling your users to be more productive on-the-go.
Download Now (Registration Required) Security Gateway Buyer's Guide: This buyer's guide, written by independent industry security expert, Gunnar Peterson, will provide the analysis and decision support that will enable you to make an informed choice. Learn about Security Gateway architectural capabilities and common business use cases where they are deployed.
Download Now (Registration Required)
MOST POPULAR NEWS
8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.
10 Wearable Health Tech Devices To Watch
Wearable medical technology is becoming a hot commodity. As these devices come to market, they have the potential to help both patients and clinicians monitor vital signs and symptoms.
Curiosity Rover Maps More Of Mars
Curiosity's rover can cover a larger area over a longer period of time than previous Mars rovers.
Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.
11 Cool Tools NASA Curiosity Brought To Mars
NASA's Curiosity Mars rover has a toolbox to make any gadget-lover jealous. Check out our drill-down on the instruments helping determine whether microbial life ever existed on the red planet.
RESOURCES AND EVENTS
E2 Innovate Conference & Expo The business world is changing. Is your company ready? E2 Innovate, formerly Enterprise 2.0, is the only event of its kind, bringing strategic business professionals together with industry influencers and next-gen enterprise technologies. Register today and save $200 on current pricing or get a free expo pass. Nov. 12-15, 2012, at the Santa Clara Convention Center, Silicon Valley. Get more details and register