High-tech

High-tech
Light

Thursday, April 18, 2013

IT pro has a hair-raising hobby: competitive bearding

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Apr 17, 2013 8:48 PM
Subject: IT pro has a hair-raising hobby: competitive bearding
To: <aquarianm@gmail.com>
Cc:

  Run from Daylight | OpenDaylight is building on our work, SDN group's director says
 
  Network World After Dark

Forward this to a Friend >>>


IT pro has a hair-raising hobby: competitive bearding
IT professional Chad Roberts shows how he puts his best faces forward Read More


WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

WHITE PAPER: PhoneFactor

Malware Threats Force Authentication to 'Step Out' Of Band
Malware, like ZeuS and other real-time attacks, has rapidly outpaced all other banking security threats to defeat most security measures in place today. This whitepaper examines these current malware threats and today's best practices for mitigating them, such as out-of-band authentication and transaction-level verification. Learn More

Run from Daylight
Once word started to spread among the vendor community about the OpenDaylight SDN project before it was announced, Dell decided to initiate its own SDN standards effort within the Object Management Group. That effort, an SDN working committee within the OMG, now has about 20 other participants, said Tom Burns, vice president and general manager of Dell Networking. Read More

OpenDaylight is building on our work, SDN group's director says
The OpenDaylight Project may have won attention last week with a founding list of vendors including Cisco Systems and Juniper Networks, but it's standing on the shoulders of others, according to the head of the Open Networking Foundation. Read More

An arrest? Boston Globe contradicts Boston Globe
No one seems to know for certain at the moment whether an arrest has or has not been made in the Boston Marathon bombing, so the Boston Globe appears to have opted for the route of reporting both possibilities as fact. They've got to be at least half right. Read More

Google adds IT admin features for Chrome browser
Google has beefed up the administration and management controls that IT staff have over their users' Chrome browsers. Read More

Kaspersky Lab launches world's first anti-malware product for UEFI
Microsoft Malware Protection Center recently discovered a sneaky Trojan that deletes its components to stop forensic investigators and researchers from analyzing it. The downloader was the payload. On the MMPC blog, Jonathan San Jose wrote about TrojanDownloader:Win32/Nemim.gen!A: Read More

How QR codes can hack your phone
By: Bhavesh Naik With the huge popularity in mobile devices like the smartphone and tablets, two-dimensional barcodes, also called QR codes, are beloved by marketers. QR codes, or Quick Response codes, were designed for the automotive industry in Japan. Now, QR codes have become popular outside the industry due to greater reliability and storage space. Originally designed for industrial application,... Read More

DDOS attacks have increased in number and size this year, report says
The volume, duration and frequency of distributed denial-of-service (DDOS) attacks used to flood websites and other systems with junk traffic have significantly increased during the first three months of this year, according to a report released Wednesday by Florida-based DDOS mitigation provider Prolexic. Read More

Red Hat, Hortonworks prep OpenStack for Hadoop
Merging the worlds of big data and cloud computing, Red Hat, Hortonworks and Hadoop integrator Mirantis are jointly building a software program, called Savanna, that will make it easier to deploy Apache Hadoop on an OpenStack cloud service. Read More

15 most innovative products at DEMO Mobile 2013
Read More

 
 
 

SLIDESHOWS

How to solve Windows 8 crashes

Like any computer operating system, Windows 8 can fall over. Luckily, there is an easy way to diagnose the cause of most crashes.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 13 PC technologies that need to disappear, stat!

2. How hacking fixed the worst video game of all time

3. Computer problem grounds all American Airlines flights

10. Windows Blue may restore Start button, Desktop, Microsoft's hopes

9. Tactics of WordPress attackers similar to bank assaults

6. 6 fresh Apple iPhone 6, iOS 7 concept designs

5. How to solve Windows 8 crashes

4. Microsoft eyes ditching browser for secure Web apps

7. Windows 8: How to solve the Start button dilemma

8. $500M state pension software system wracked by backlogs

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment