High-tech

High-tech
Light

Thursday, October 10, 2013

EXCLUSIVE: Inside CIO Paychecks

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 9, 2013 2:03 PM
Subject: EXCLUSIVE: Inside CIO Paychecks
To: <aquarianm@gmail.com>
Cc:

Big data's dirty little secrets

SDN: The security pros and cons of using it in your organization

Network World Daily News PM
October 09, 2013
Share this email

Inside CIO paychecks

Ever wonder what payday is like for CIOs at giant global companies? It's not easy to find out, since public companies are only obligated to report compensation data for the CEO, CFO and three highest-paid executive officers. Network World scoured the proxy statements of the 500 largest U.S. companies to find instances where a CIO or senior IT executive ranks among a company's top-tier executive officers. We found 25. Check out the details on their multi-million pay packages, which include six-figure salaries, cash bonuses, stock awards, and perks.

READ MORE
 

Issue highlights

1. Big data's dirty little secrets

2. INSIDER SDN: The security pros and cons of using it in your organization

3. McAfee Advanced Threat Detection: A Sign of Things to Come

4. Apple to reveal new iPads Oct. 22

5. Hackathons for the rest of us

6. 6 cool new wireless technologies from MIT

7. Nike sprints from offshore to onshore developers

8. Security automation research, with a human touch, could net nearly $50M grant

9. IBM's Power7+ remains alive with new integrated servers

10. iPhone 5s offers better security today, a peek at Apple of tomorrow

11. D'oh! Basic flaw in WhatsApp could allow attackers to decrypt messages

12. Ultimate guide to the paperless office

13. VM-based storage platform scales out to multiple sites

14. Big data's dirty little secrets

15. McAfee Advanced Threat Detection: A Sign of Things to Come

16. Most costly cybercrime attacks: Denial-of-service, malicious insider and web-based

17. Adobe's breach casts doubt on their SaaS business model

WHITE PAPER: HP and Intel® Xeon® processors

HP StoreOnce with Symantec Backup Solutions

This paper looks specifically at the considerations and benefits achievable when an organization deploys data protection architectures powered by HP StoreOnce appliances and Catalyst APIs with Symantec OpenStorage Technology (OST). Learn More

Big data's dirty little secrets

Big Data is one of the hottest trends in enterprise IT right now, and for good reason. The ability to collect, store, and analyze unprecedented quantities of all kinds of data promises to remake everything from weather forecasting to consumer marketing. But while that promise is being realized at a few pioneering companies, from Amazon and Macy's to Google and Facebook, many other organizations are... READ MORE

INSIDER

SDN: The security pros and cons of using it in your organization

SDN benefits include automating and easing network administration duties and improving application performance. But it also introduces a number of potential threat vectors into your environment. What should you know before you invest in SDN? READ MORE

McAfee Advanced Threat Detection: A Sign of Things to Come

With the glitz and glamour of Las Vegas as a backdrop, McAfee rolled out its Advanced Threat Defense (ADT) strategy last week. Yes, McAfee now offers a sandboxing appliance of its own but it would be foolish to judge this announcement based on its security device alone. McAfee's ATD is actually an integrated architecture that goes beyond detection. McAfee's ATD message is actually, "find,... READ MORE

Apple to reveal new iPads Oct. 22

Apple will introduce new iPad tablets on Oct. 22, coinciding with the unveiling of the company's fourth-generation iPad and iPad Mini in 2012. READ MORE

Hackathons for the rest of us

Forget softball games. Hackathons promote togetherness among techies while benefiting the enterprise, and no one gets pitcher's elbow. READ MORE

RESOURCE COMPLIMENTS OF: Enterprise Mobility Management Tech Seminar

Dallas Execs Network-Enterprise Mobility Management Seminar

Attend this content-rich, one-day event and determine the next steps to take as you hear from mobility experts, enterprise IT professionals and leading product and service providers. Thursday, November 14, 2013. 8:00 am-4:15 pm. W Dallas - Victory Hotel. Register now

6 cool new wireless technologies from MIT

MIT grad students show off their research at Wireless Retreat READ MORE

Nike sprints from offshore to onshore developers

With its apps, sensors and devices, Nike is increasingly becoming a technology company. It's found the best development teams come from onshore, not offshore, outsourcers. READ MORE

Security automation research, with a human touch, could net nearly $50M grant

Researchers from Carnegie Mellon University and Army Research Laboratory will join forces with those from a handful of universities in an effort to better automate cybersecurity decisions. The five-year project has attracted $23.2 million in funding from CMU's CyLab, and could be extended to $48.2 million over 10 years. READ MORE

IBM's Power7+ remains alive with new integrated servers

IBM's decision to license its future Power8 processor to third parties doesn't mean life has ended for the current Power 7+, which will go alongside x86 chips into new PureFlex System preconfigured servers announced on Wednesday. READ MORE

iPhone 5s offers better security today, a peek at Apple of tomorrow

The iPhone 5s, like its cheaper sibling the iPhone 5c, has been available for a few weeks now, earning plaudits from most reviewers and igniting ignorant online discussions around mobile security and application performance. Some of that ignorance is intentional FUD from Android fanboys and security purveyors. READ MORE

WHITE PAPER: CDW

Principles of PCI Compliance

Take the time to understand and learn to apply the requirements for locking down payment card data. Read Now

D'oh! Basic flaw in WhatsApp could allow attackers to decrypt messages

The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer. READ MORE

Ultimate guide to the paperless office

You have no excuse for being buried under paper these days. The tools to digitize most or all of your pile are readily at hand and very affordable. We're not exactly a paperless society yet, but this guide will help you get to less paper, and that's a step in several right directions: increased efficiency, better security, and a reduced environmental footprint. We've also added a few ways to eliminate paper from your workflow, the better to declutter your office--and your mind. READ MORE

VM-based storage platform scales out to multiple sites

Enterprises that want their storage organized around virtual machines will get more hardware options and greater scalability later this year from Tintri, a startup that specializes in VM-based storage. READ MORE

Big data's dirty little secrets

Big Data is one of the hottest trends in enterprise IT right now, and for good reason. The ability to collect, store, and analyze unprecedented quantities of all kinds of data promises to remake everything from weather forecasting to consumer marketing. But while that promise is being realized at a few pioneering companies, from Amazon and Macy's to Google and Facebook, many other organizations are... READ MORE

McAfee Advanced Threat Detection: A Sign of Things to Come

With the glitz and glamour of Las Vegas as a backdrop, McAfee rolled out its Advanced Threat Defense (ADT) strategy last week. Yes, McAfee now offers a sandboxing appliance of its own but it would be foolish to judge this announcement based on its security device alone. McAfee's ATD is actually an integrated architecture that goes beyond detection. McAfee's ATD message is actually, "find,... READ MORE

Most costly cybercrime attacks: Denial-of-service, malicious insider and web-based

$11.56 million is the mean average cost of cybercrime per U.S. corporation, ranging between $1.3 million to $58 million, according to the fourth annual Cost of Cyber Crime study conducted by the Ponemon Institute. That is up 78% from four years ago and increased 26% from the average cost reported in 2012. READ MORE

Adobe's breach casts doubt on their SaaS business model

By now you should have heard about the latest massive breach over at Adobe. Besides the source code for Acrobat and Cold Fusion, something like 3 million accounts were breached as well. READ MORE

WHITE PAPER: Crittercism

The 2013 Mobile App Performance Management Report

Most enterprises are looking for ways to leverage their investments in web technology to handle mobile app performance, but between monitoring, OS variants, screen sizes and OEMs, this can be a costly and complex approach. This 2013 Mobile APM Report highlights best practices for meeting mobile app challenges and ensuring mobile app performance. Read more!

SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 2013 tech industry graveyard

2. 10 things every new Mac user should know

3. 802.11ac 'Gigabit Wi-Fi' starts to show potential, limits

4. Gartner: The top 10 IT altering predictions for 2014

5. Android browser tips and tricks

6. 25 tips and tools to make Google Drive better

7. Products of the week 10.07.13

8. 15 must-have iOS apps you can't get on any other platform

9. Shh ... Cisco's latest switch supports VMware NSX

10. Geek-themed meme of the week archive

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment