Microsoft's budget Windows VR headsets roll out to developers soon

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Virtualization Alert

Mar 06, 2017
Featured Image
INSIDER

Are Virtual CISOs the answer to your security problems?

Virtual CISOs can be an invaluable resource for companies with limited resources. But are they a short-term fix to a long-term problem? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft's budget Windows VR headsets roll out to developers soon
Virtual assistants move into DevOps
(2016) Did Google kill a … donkey?
HTC’s Netflix-esque VR subscription costs $6.99 per month
(2006) The network industry’s most colorful story ever
Cisco deepens enterprise network virtualization, security detection of DNA suite
NTT DoCoMo demos VR control of robots over 5G
MediaTek wants to put its new 10-core chip in $300 VR smartphones
Intel now supports Vulkan on Windows 10 PCs

White Paper: GlobalSCAPE

5 Rings of Data Integration Hell

Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More

Thumbnail Image

Microsoft's budget Windows VR headsets roll out to developers soon

A lucky few developers will be able to get their hands on a low-cost Windows virtual reality headset starting this month. Microsoft announced Wednesday that the Acer Mixed Reality Developer Edition headset will start rolling out to a handpicked batch of software makers starting the end of March, with more coming later. Read More

Thumbnail Image

Virtual assistants move into DevOps

DevOps practices are fueling adoption of ChatOps and VoiceOps, in which IT departments are leveraging Slack, Amazon.com’s Alexa and other like tools to automate operations. Read More

Thumbnail Image

(2016) Did Google kill a … donkey?

A few days ago I needed to know whether Google had actually killed a particular product or merely put it on a back burner, so I typed into the company’s search-engine box: “Did Google kill …” Read More

Thumbnail Image

HTC’s Netflix-esque VR subscription costs $6.99 per month

HTC is giving users of its Vive virtual reality headset access to a Netflix-like subscription service. Everyone who currently owns a Vive will get a free trial for a month, and the service will cost $6.99 a month thereafter. Read More

(2006) The network industry’s most colorful story ever

A quick study of the network industry could be enough to give you the blues. Read More

Thumbnail Image

Cisco deepens enterprise network virtualization, security detection of DNA suite

Cisco today announced a variety of hardware, software and services designed to increase network virtualization and bolster security for campus, branch office and cloud customers. Read More

Thumbnail Image

NTT DoCoMo demos VR control of robots over 5G

At this week's Mobile World Congress in Barcelona, Japan's NTT DoCoMo is demonstrating remote control of robots via a wireless virtual reality system over a next-generation 5G wireless link. Read More

Thumbnail Image

MediaTek wants to put its new 10-core chip in $300 VR smartphones

The smartphone world will be rocked with MediaTek's new 10-core Helio X30 chip, which will bring premium features like Google's DayDream virtual reality platform to Android handsets with prices starting at $300. Read More

Thumbnail Image

Intel now supports Vulkan on Windows 10 PCs

Intel is bringing more options to improve gaming and virtual reality experiences on Windows PCs with official support for Vulkan. Read More

White Paper: GlobalSCAPE

Be Afraid of Your Shadow: What is 'Shadow IT' and How to Reduce It

Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

5 things to think about for industrial IoT readiness

11 low-tech, decidedly cool cars Read More

Most-Read Stories

1. 10 killer Raspberry Pi projects (Collection 1)
2. 13 reasons not to use Chrome
3. AWS says a typo caused the massive S3 failure this week
4. AMD's Ryzen processor forces hefty price cuts from Intel
5. Hotel chain bets big on digital transformation and is seeing great results
6. Avaya wants out of S.F. stadium suite, not too impressed with 49ers either
7. Hottest iPad & Surface alternatives from Mobile World Congress 2017
8. 5 lessons from Amazon’s S3 cloud blunder and how to prepare for the next one
9. Iraqi hacker takes credit for hijacking subdomain, defacing Trump site
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Virtualization Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.