Thursday, January 5, 2012

CES: Will the ultrabook be as ultra as promised?

  Barbara Krasnoff: CES thoughts: Will the ultrabook be as ultra as promised? | Darlene Storm: Brute force tools crack Wi-Fi security in hours, millions of wireless routers vulnerable
 
  Computerworld Blogs

Forward this to a Friend >>>


IT Blogwatch: Holy P2P! File-sharing now official religion in Sweden...
Sweden now has a new, officially-recognized religion: File-sharing. The government agency, Kammarkollegiet, has finally registered the Church of Kopimism as a religious organization. In IT Blogwatch, devout bloggers see the funny side. Not to mention: Fishing under ice in Finland ... Read More


RESOURCE COMPLIMENTS OF: Cisco Systems, Inc.

Converge Your Networks for Flexibility
Cisco Unified Fabric offers the industry's largest and first fully interoperable portfolio of Fiber Channel integrating storage and data networking to deliver transparent convergence, massive three-dimensional scalability and sophisticated intelligence. It also reduces your costs up to 45%. Learn More

RESOURCE COMPLIMENTS OF: Red Hat

FOUR STEPS TO A PRIVATE OR HYBRID CLOUD
STEP 4: ACCELERATE BUSINESS RESULTS WITH YOUR CLOUD. WEBINAR - JANUARY 19, 2012. In the From Virtualization to Cloud webinar series, Red Hat® and the IT Process Institute guide you through the best practices of cloud-building. Learn how to optimize cloud economics, reshape behavior for IT-as-a-Service, and streamline cross-functional collaboration. REGISTER NOW

Barbara Krasnoff: CES thoughts: Will the ultrabook be as ultra as promised?
I've been following all the speculation about the upcoming CES trade show -- naturally enough, since I and several of my Computerworld colleagues will be there next week -- and the word everyone is tossing around as this year's product to watch is the ultrabook. Read More

Darlene Storm: Brute force tools crack Wi-Fi security in hours, millions of wireless routers vulnerable
Millions of wireless routers around the world, about 95%, are vulnerable to brute force attacks which can crack WPA/WPA2 and other Wi-Fi router security protocols. That was made much easier with the release of two free brute force tools that can exploit the WiFi router flaws and crack a wireless network in two to ten hours. Read More


WEBCAST: IBM

Improving Governance, Risk and Compliance
In this webcast you'll learn how your organization can become more responsive to financial market challenges while reassuring decision makers the accuracy of execution. Register Now

Preston Gralla: Upcoming CES news: Microsoft, partners to spend hundreds of millions to market Windows Phones
Determined to make 2012 a breakout year for Windows Phones, Microsoft and its partners will spend hundreds of millions of dollars to market Windows Phone devices, including a bounty of up to $15 for every Windows Phone sold by retail sales people. So says Paul Thurrot on his blog, and those numbers wouldn't surprise me at all. Read More

Ben Golub: Clouds, neurosis and Joni Mitchell
There's an old saying that the difference between neurosis and psychosis is that neurotics build castles in the clouds and psychotics move in. What then does that say about those of us who try to build storage farms in the cloud? Are we afflicted with some special form of insanity? Read More

Shark Tank: So THAT'S what the PC nobody uses is for!
Pilot fish's wife, the IT consultant, gets an alert at 10 p.m., and he drives with her to the client site. But when he walks in, there's a shriek of disgust. Read More

 
 
 

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

IT made headlines throughout 2011, from social media's role in Arab Spring to the popularity of Google's Android and Google+ and more. What was the top story of this year?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan3511@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:28 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive