Monday, July 25, 2011

China shuts down fake Apple "Stoers" in Kunming

  Jonny Evans: 24 hours with Lion, 'it just works' (mostly) | Sharon Machlis: My top iPad photo apps
 
  Computerworld Blogs

Forward this to a Friend >>>


IT Blogwatch: China shuts down fake Apple "Stoers" in Kunming
Apple is pondering what to, following recent revelations of fake Apple Stores in Kunming, China. Local government has closed down two of them, but three remain. In IT Blogwatch, bloggers marvel at the dodgy reproductions. Not to mention: A glorious hour of intros, complete with animated sleeve art ... Read More


RESOURCE COMPLIMENTS OF: Datawatch Corporation

Monarch 11 report analytics, download the free trial today
Monarch 11 Report Analytics provides business users with a self-service environment to create dynamic, enterprise-wide analytical solutions from existing static reports & business documents. Monarch 11 users can easily report on data from ERP Reports, text files, html files, PDFs & semi-structured content, transforming data into high performance reports.

RESOURCE COMPLIMENTS OF: SAP

The Real-time Value of BI
Today's top performing organizations have developed a strategy to manage growth in data volume & complexity while exploiting that data to create quicker business insight. Learn how best-in-class companies are delivering broader access to information in a shorter timeframe to facilitate substantial improvement in key business performance metrics. Click to continue

Jonny Evans: 24 hours with Lion, 'it just works' (mostly)
There's already over a million Apple Lion OS users worldwide, and the feedback on the new operating system is coming in fast and furious: "It just works". Well, to qualify that claim, it mostly just works and a lot of users are having problems getting their finger memories around reverse scrolling. Read More

Sharon Machlis: My top iPad photo apps
Photography enthusiast? These apps will help you get more out of your iPad. Read More

Michael Horowitz: How safe is ismycreditcardstolen.com? A lesson in pessimism and technology.
I have previously written here that the most important aspect to Defensive Computing is pessimism. Someone who always doubts what they are told, is much better protected than a trusting person with lots of security software on their computer. I bring this up regarding the website ismycreditcardstolen.com. Is it safe? Steve Gibson and Leo Laporte initially said it was. Read More


VIDEO: Cisco

Avoid Downtime with Network Resilience
Network resiliency is a complex vision that encompasses security, availability, and network responsiveness. No single technology or system makes end-to-end network resiliency possible. However, a combination of Cisco innovations provides your network with high performance, fast recovery, and the ability to adapt dynamically to changing conditions. Learn More>

Jonny Evans: The Lion MultiTouch gesture guide
There's a host of Trackpad gestures inside Mac OS X Lion. These are all described within Lion's Trackpad prefs inside System Preferences. Sometimes you might just need a reference list. For those times, why not Bookmark this page, or print it out while you learn? Read More

Sharon Machlis: Early Google+ can't touch Twitter for following breaking news
Plus needs more robust search, a better way to scan and a lot more users before it can challenge Twitter. Read More

Jonny Evans: Apple iOS 5 beta hints Nuance voice recog for iPhone 5
Even as we get to grips with OS X Lion, there's even more speculation about the voice recognition and personal assistance features we can all look forward to in iOS 5, when your iPhone will begin to seriously augment your life, thanks to Nuance and Apple's purchase of Siri last year. Read More

Shark Tank: Critical, redefined
Support pilot fish gets a call from a user: "My application won't run under the the new operating-system version that you just released. It's a critical application. Can you get it to work?" Read More

 
 
 

COMPUTERWORLD 'S STORAGE SURVEY

Computerworld is preparing a special report on storage and would like to know how your organization is using various storage technologies. Look for the Spotlight Feature online and in the October 10, 2011 issue of Computerworld.

Thank you for taking our survey.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Can 'Anonymous' survive to hack another day?

COMPUTERWORLD'S TOP GREEN-IT ORGANIZATIONS

Computerworld is identifying the top organizations leading the way with green IT. We're seeking input from organizations that are both reducing energy consumption in their IT equipment and using technology to conserve energy and lower carbon emissions.

Please fill out our short survey, or forward this link to the person in your company best able to answer questions about IT energy issues. The deadline for surveys has been extended to Monday, July 25.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan3511@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:16 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive