Tuesday, October 14, 2014

Q&A: How Yik Yak wants to weed out abuse and become the next Twitter

Q&A: How Yik Yak wants to weed out abuse and become the next Twitter | Review: Surface Pro 3 isn't really what enterprises want in a laptop

ITworld Mobile & Wireless Strategies

Google Plus LinkedIn Facebook Twitter


Samsung's new Wi-Fi tech is five times faster than today's wireless networks
Samsung is developing a new Wi-Fi technology that will let you transfer 1GB in 3seconds -- but don't expect it in your Galaxy phone anytime soon. Read More


WHITE PAPER: Kaminario

Testing of VMware View VDI on Kaminario K2 storage
This technical report covers detailed performance and efficiency tests for the Kaminario K2 array supporting VMware Horizon View virtual desktops that quantify its ability to support a range of critical VDI workloads. Learn More>>

RESOURCE COMPLIMENTS OF: The Digital Edge 25 Awards

The Digital Edge 25 Awards: Application Deadline Nov. 3
The Digital Edge 25 Awards focus on the cross-functional business leadership that drives success. The Digital Edge 25 Awards attest to the power of digital leadership vision. The Digital Edge 25 Awards recognize a select group of digital achievers who have made great strides towards being a digital-centric business. Here's your opportunity for recognition. Submit now.

Q&A: How Yik Yak wants to weed out abuse and become the next Twitter
Of the new social media apps that have sprung up around connecting anonymously, Yik Yak might be the most toxic. Or the most misunderstood. Perhaps it's both. Read More

Review: Surface Pro 3 isn't really what enterprises want in a laptop
Surface Pro 3 is touted as 'the tablet that can replace your laptop', but is it what businesses want to issue to all their employees? Read More

5 things you need to know about VoLTE
Voice over LTE (VoLTE) means better sounding voice calls and the ability to use voice and data at the same time, among other things. Here are five facts you should know about the next-generation wireless network technology. Read More

Report: Huge spike in mobile malware targets Android, especially mobile payments
Two very predictable traits drive cybercriminals: First, they tend to focus on targets with the highest odds of success. Second, they prefer attacks that generate profit. A new joint report from Kaspersky Lab and INTERPOL underscores how these two factors contribute to concerning trends in mobile threats. Read More

Facebook, armed with data, helps others show mobile ads
A "like" on Facebook is worth a lot to advertisers there. Now it's also worth something to advertisers in other mobile apps. Read More


WHITE PAPER: Absolute Software Corporation

Extend Compliance And Risk Management To What Really Matters
While governance, risk management, and compliance (GRC) programs have matured well over time, this maturity has come mostly in response to new and changing regulations, which has resulted in programs that are narrowly focused on protecting employees, investors, consumers, and other stakeholders — not on protecting the business itself. Learn More

'Unlawful' WiFi hotspot blocking ruling highlights academic IT headaches
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots -– the sort that provide wireless data access from the same -- it's not the best of times. Read More

Google faces uphill fight in mobile messaging
Search giant Google reportedly plans to roll out a mobile messaging app to compete with WhatsApp. Read More

MobileIron brings mobile management into mainstream IT
MobileIron announced on Monday plans to add integration with Microsoft System Center Console Manager (SCCM) as a feature to its EMM suite. Read More

Highfive's $799 videoconferencing tool throws meetings to your TV
Highfive's $799 device connects to an HDTV and lets you "throw" a conference from a mobile device to the larger display. Read More

Phablet vs. mini-tablet: The big choice between two smallish devices
As phones grow and tablets shrink, they're merging in form, but not always in function. Read More


DON'T MISS...

Head-scratchers: 10 confounding programming language features

Top 25 free tools for every Windows desktop

15 simple, secret Windows tips and tricks to save you time

Superclass: 14 of the world's best living programmers

The 10 best laptops of 2014 (so far)

ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_wireless_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.