Microsoft continues to be an industry leader, generating healthy profits from sales of its Windows operating system and productivity software, such as Office. But Microsoft could learn a lesson from BlackBerry’s ongoing problems.
At its recent BlackBerry World conference in Orlando, BlackBerry announced that BlackBerry Messenger (BBM) will soon be available as a free app for both iOS and Android smartphones. While the news was arguably one of the highlights of the event, its timing was nonetheless too little, too late. What would have been seen as a brilliant tactical move two or three years ago is viewed today as desperate act with little chance of making a difference.
This is a preview of
Microsoft can learn a crucial lesson from BlackBerry
.
Read the full post (255 words, 1 image, estimated 1:01 mins reading time) Categories: General.
Tags: BlackBerry, Crucial, from, Learn, Lesson, Microsoft
By IPHere —
May 29, 2013 at 1:18 am Sears hopes to fill its empty stores with servers. Will the troubled retailer forge a new path for companies with unused space?
Network Computing
Permanent link to this post (25 words, estimated 6 secs reading time)
Categories: General.
Tags: center, data, Model, Properties, Sears', Strategy, Unused
By IPHere —
May 28, 2013 at 7:12 pm What will it take to reap the benefits of 802.11ac, the next generation of wireless networking? A whole lot of wire, and a whole lot of hardware.
Network Computing
Permanent link to this post (30 words, estimated 7 secs reading time)
Categories: General.
Tags: 802.11ac, Paradox
By IPHere —
May 28, 2013 at 1:13 pm
As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from The MITRE Corp. say that the current approach relies too heavily on access control mechanisms that can easily be bypassed.
This is a preview of
BIOS Bummer: New Malware Can Bypass BIOS Security
.
Read the full post (208 words, estimated 50 secs reading time)Categories: General.
Tags: BIOS, Bummer, Bypass, Malware, Security
By IPHere —
May 28, 2013 at 7:22 am If you’re looking to purchase WAN optimization gear, don’t get wrapped up in performance numbers. Start instead with pricing, deployment and operational issues, and the protocols and applications you need to support.
Network Computing
Permanent link to this post (35 words, estimated 8 secs reading time)
Categories: General.
Tags: Optimization, Part, Performance, Second
By IPHere —
May 24, 2013 at 7:23 pm The National Security Agency, which is building a massive information-gathering data center in Utah, was caught by surprise on a tax bill that might have added millions to its costs.
Network Computing
Permanent link to this post (33 words, estimated 8 secs reading time)
Categories: General.
Tags: Caught, center, data, Unawares
By IPHere —
May 24, 2013 at 1:18 pm
When online attackers operating from China or other countries steal corporate secrets, let businesses strike back and retrieve stolen information from attackers’ networks.
That gloves-off approach is just one of many recommendations for combating industrial espionage outlined in a new report from the Commission on the Theft of American Intellectual Property, which is headed by the former director of national intelligence, Dennis Blair, as well as Jon Huntsman, who’s served as the governor of Utah as well as U.S. ambassador to China.
This is a preview of
Strike Back If China Steals IP, Companies Told
.
Read the full post (229 words, estimated 55 secs reading time)Categories: General.
Tags: Back, China, Companies, Steals, Strike, Told
By IPHere —
May 24, 2013 at 7:18 am Compiling our SDN product comparison provided a vivid lesson in the difficulty of getting meaningful prices for enterprise IT equipment.
Network Computing
Permanent link to this post (23 words, estimated 6 secs reading time)
Categories: General.
Tags: More, Need, Pricing, Transparency, Vendors
By IPHere —
May 23, 2013 at 7:15 pm News roundup: Big-IP AAM aims to improve SaaS performance; Hitachi unveils enterprise file sync and share; Sourcefire adds network file and device trajectory to malware protection; Lantronix supports remote power management for branch IT.
Network Computing
Permanent link to this post (37 words, estimated 9 secs reading time)
Categories: General.
Tags: Acceleration, Application, Combines, Management, Traffic
By IPHere —
May 23, 2013 at 1:15 pm
Two very large clouds have been hanging over Dell for most of the year: the flailing PC market, and CEO Michael Dell’s ongoing attempt to take the company private. Despite these distractions, Dell itself has spent 2013 doing exactly what it did at the end of 2012: launching new enterprise products and declaring that its transition from PC maker to end-to-end solution provider has concluded.
This is a preview of
Dell Launches New Cloud Products For Citrix Users
.
Read the full post (222 words, estimated 53 secs reading time)Categories: General.
Tags: Citrix, Cloud, Dell, Launches, Products, users
By IPHere —
May 23, 2013 at 7:13 am