High-tech

High-tech
Light

Friday, December 6, 2013

NSF tech guy smacked for stealing $94K in electronics

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 6, 2013 2:34 PM
Subject: NSF tech guy smacked for stealing $94K in electronics
To: <aquarianm@gmail.com>
Cc:

Top computer gifts holiday 2013

Foundation exec slams Microsoft for 'meaningless' security pledge

Network World Daily News PM
December 06, 2013
Share this email

NSF tech guy smacked for stealing $94K in electronics

This IT guy had an all-together different idea of how to spend government money. The Department of Justice today said James Troy Clark, 51, of Fredericksburg, Va., an IT specialist with the National Science Foundation plead guilty this week to theft of government property totaling more than $90,000. [IN THE NEWS: Bitcoin's highest highs, lowest lows]

READ MORE
 

Issue highlights

1. Top computer gifts holiday 2013

2. Foundation exec slams Microsoft for 'meaningless' security pledge

3. Veeam: Backup, but for virtual machines

4. Cloud Security Alliance offers ultra-high cloud security plan

5. Navy blasts drone from submerged sub

6. Holiday Shopping? Android, Apple, or Microsoft

7. Gift Guide 2013: Games and gaming gear

8. Get a Password Manager Now

9. Box fuels international expansion with new funding

10. How to Use Analytics to Save Your IT Department

11. Gift Guide 2013: Photo and video gadgets

WHITE PAPER: VCE

First Real Look at the Integrated Systems Market

The word is out that the market for integrated systems is a key growth area for data center hardware infrastructure. This Gartner report sizes the market and profiles early leaders in this important and emerging area in three segments. Learn More. Learn More

Top computer gifts holiday 2013

READ MORE

Foundation exec slams Microsoft for 'meaningless' security pledge

The Free Software Foundation on Thursday attacked Microsoft for "meaningless" public statements on privacy and security, claiming that Windows is "fundamentally insecure." READ MORE

Veeam: Backup, but for virtual machines

The rise of virtualization has ushered in dramatic shifts in the computing landscape: Servers are more efficient and users can be more agile. But it's also created new challenges for backup and recovery. READ MORE

WEBCAST: SAP

Business Transformation Through Technology Innovation

Cloud computing, rampant mobility, Big Data, and social business have created challenges never seen before. There is a need for a new application platform. In this webcast, find out about the forces shaping the 'third platform', and why the move to the third platform is the only way to meet customer needs. Learn more

Cloud Security Alliance offers ultra-high cloud security plan

The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies. READ MORE

Navy blasts drone from submerged sub

The U.S. Naval Research Laboratory said it has successfully launched an unmanned electric fuel cell aircraft from a submerged submarine. READ MORE

Holiday Shopping? Android, Apple, or Microsoft

Have you ever noticed how we are all considered IT experts come the holiday time? Brothers, mothers, grandfathers, aunts, cousins and close friends all turn to us for their latest technology purchasing decision. Since I am a bit of a gadget guy, I enjoy these conversations. It's fun to step through what they think they want and what they actually need. Here are a few of my observations: Read... READ MORE

WHITE PAPER: SAP

Transition to the 3rd Platform for Enterprise Applications

The tech industry is in the midst of a major transition brought about by the combination of four forces. Since the lifetime of an application software package in a business is significant, application buyers need to consider support for the 3rd Platform. Learn more

Gift Guide 2013: Games and gaming gear

Let's face it - this holiday season is going to be really good for the video gamer on your holiday list. Not only are there two new gaming consoles coming out (the Xbox One and Sony Playstation 4), but there are a bunch of games that will keep you entertained for months on end. Plus the accessories to enhance those games and experiences continue to be top-notch. READ MORE

Get a Password Manager Now

Well maybe it is just the time of year, or maybe it's the time of man (extra points if you know what song that is from), but password thefts are popping up all over. First the READ MORE

Box fuels international expansion with new funding

Investments from network operators Telstra, TelefA3nica and others will help fuel Box's international expansion. READ MORE

How to Use Analytics to Save Your IT Department

As times change, so does the role of IT. A generation ago, it had to embrace PCs and client/server solutions. Now IT departments are faced with the consumerization of technology. Could the same analytics that helps companies predict customer behavior help IT departments stay relevant? READ MORE

Gift Guide 2013: Photo and video gadgets

Like the world of smartphones and tablets, where there are so many choices and options that trying to highlight them all is an experiment in confusion, the world of digital cameras and video cameras presents a multitude of devices. For this wrapup, then, we're presenting a bunch of materials that the photographer and/or videographer would like to include in their arsenals, with a focus on things that let people watch videos or produce photos easier. READ MORE

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise

Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

SLIDESHOWS

Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft ends Windows 7 retail sales

2. 8 Ethernet predictions for 2014

3. 20 best iPhone/iPad games of 2013

4. The 21 most powerful enterprise networking companies

5. A few finally find HotSpot 2.0 Wi-Fi connections

6. Cisco sees SDN, Internet of Things in its 2014 crystal ball

7. Windows 8 Update: China prefers to stick with dying Windows XP rather than upgrade

8. IT security pros often seen as 'innovation killers,' says ADP's IT security chief

9. Nexus 5 is designed to work on Verizon Wireless, and most other networks

10. Google Compute Engine vs. Amazon Web Services cloud: The battle is on

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment