High-tech

High-tech
Light

Friday, October 4, 2013

The 'Bad Boys' of open source

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 3, 2013 9:01 PM
Subject: The 'Bad Boys' of open source
To: <aquarianm@gmail.com>
Cc:

  Verizon Recreates the Public Cloud for the Enterprise IT | Oracle scoffs at charge that Ellison is overpaid
 
 
  Network World After Dark

Forward this to a Friend >>>


The 'Bad Boys' of open source
The open source world's most notorious characters. Read More
 


WHITE PAPER: Akamai Technologies, Inc.

Demonstrate the Business Value of Security
This Forrester report highlights the most common mistakes made in the budgeting process and offers Forrester's step-by-step Information Security Value Model to guide you through a strategy to support smart investment and resource allocation. Learn More

WEBCAST: Dell VMware

A Data Protection Guide for IT Leaders in Media
What if you could restore your data quickly, shrink backup windows and save without creating risk? Learn how IT leaders within media are providing end-to-end protection of their data stored across physical, virtual and cloud environments through an open, scalable and affordable approach. View Now

Verizon Recreates the Public Cloud for the Enterprise IT
Verizon Terremark CTO John Considine took the stage at Interop 2013 here in New York City Thursday to unveil the new offering, which he says has been built from scratch to support scalability and ease of use at its core. "I'm here to talk about a new cloud with new rules," Considine told Interop attendees. "Just a few years ago, we were having a serious debate about whether cloud was a fad or something real." Read More
 

Oracle scoffs at charge that Ellison is overpaid
Oracle has fired back against charges by a shareholder advisory group that CEO Larry Ellison's compensation is excessive given the company's performance and when compared to other tech company CEOs. Read More
 

Blizzident's 3D-printed toothbrush cleans teeth in 6 seconds
A new toothbrush tailored to your mouth through 3D imaging can automatically clean teeth in seconds by just biting and grinding on it. Read More
 

Patent firm Lodsys backs out of dispute with Kaspersky Lab
Security firm Kaspersky Lab said patent firm Lodsys had withdrawn its claims rather than face the verdict of the court in a patent dispute. Read More
 

Research buries Microsoft's Bing-vs.-Google claim
Microsoft's claim that people prefer Bing over Google by a 2-to-1 margin in blind taste tests always smelled fishy, but now a Yale professor and his students have shown it to be pure marketing malarkey by conducting their own survey ... and they did it using Microsoft's tool of choice. Read More
 

Spotify's artful digs
Spotify hopes the art inspires their employees Read More
 

Scientists say Mars crater may be 'game-changing' supervolcano
  What scientists used to think was an impact crater on the surface of Mars now appears to be the site of an ancient supervolcano. Read More
 

Yahoo abandons T-shirt rewards for vulnerability information
  Yahoo will stop giving T-shirts as a reward for finding security vulnerabilities after a public shaming it's calling "t-shirt gate." Read More
 

Heat it, bend it, slam it and the latest gadget glass won't break
Pity the glass on the front of your smartphone. It typically gets subjected to a lot of abuse through its life and sometimes even shatters if the forces are too much. But glass manufacturers are continually pushing the boundaries of what's possible with the material, and some of the latest gadget glass is on show this week by Nippon Electric Glass at the Ceatec 2013 expo. Read More
 

Mocana unwraps protection for iOS 7 apps
Mocana will soon allow companies to wrap iOS 7 apps in a layer of security software designed to insulate enterprise data from hackers who are becoming increasingly interested in smartphones. Read More
 

5 steps for application security
The software development lifecycle can be a double-edged sword. On one hand, software needs to be developed with usability in mind, and it needs to be produced quickly. On the other hand, it also needs to maintain a solid security base. Having those two sides in equal measure is easier said than done. Darren Meyer, Senior Security Researcher for Veracode, walks us through five steps for secure application development and deployment. Read More
 

CSC: The cloud's quiet whiz kid
When most people who track the industry think of the cloud computing market, big names like Amazon Web Services, Microsoft Azure, Google, Rackspace, Verizon Terremark and others come to mind. HP, Joyent, IBM and Dell even. But Computer Sciences Corporation (CSC)? Read More
 

 

SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Research buries Microsoft's Bing vs. Google claim

2. 15 must-have iOS apps you can't get on any other platform

3. Cisco/Insieme ushering in hardware-defined networks

4. Meet the man behind Silk Road, the online drug marketplace the FBI seized

5. HP says open sourcing SDNs is wrong

6. Former Qwest CEO out of prison, blames NSA for troubles

7. 12 best places to land a tech job

8. McAfee sets sandbox appliance to explode stealthy malware

9. 80% pay raise for Cisco CEO Chambers

10. Ubuntu impresses in Linux enterprise server test


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment