High-tech

High-tech
Light

Tuesday, December 17, 2013

‘The Worm Before Christmas’ (1988)

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 17, 2013 9:01 PM
Subject: 'The Worm Before Christmas' (1988)
To: <aquarianm@gmail.com>
Cc:

  Twitter to allow tweets to be edited | Year End 2013: Microsoft Review

 
  Network World After Dark

Forward this to a Friend >>>


'The Worm Before Christmas' (1988)
Last month the tech press helped mark the 25th anniversary of the Morris Worm, the first Internet-driven worm to garner widespread media attention. Read More
 


WHITE PAPER: CDW

Virtualization Data Protection
Best practices, business considerations and practical answers to better manage and protect data in virtualized environments. This eBook focuses on data management and protection in virtualized environments, but will also share a real-life virtualization success story that could have ended in disaster. View Now

WEBCAST: Attachmate

Unlocking and Service-Enabling Legacy Assets
Whether your strategy calls for full-blown SOA, quick-turnaround mobile applications, or anything in between, Verastream Host Integrator can help. Watch this six-minute product demo and learn the noninvasive way to encapsulate mainframe data and logic as reusable services. View Now!

Twitter to allow tweets to be edited
Read More
 

Year End 2013: Microsoft Review
Year End 2013: Microsoft Review Microsoft struggled to stay relevant in the world of desktop and mobile computing, but its games division continued to achieve success. In this year in review we'll take a look at the Microsoft... From: Network World Videos Views: 0 0 ratings Time: 05:57 More in Science & Technology Read More
 

Top 10 Buzzblog posts of 2013
The approaching end of 2013 will mark seven years (or so) since Buzzblog was born. This year's batch of 10 most-read items is an eclectic bunch, including such topics as the Obama Administration's embrace of cell-phone unlocking, a court's impatience with a patent troll's non-employee dubbed "Mr. Sham," the death of Cisco's first CCIE, and the impact of mathematics on a potential zombie apocalypse. Read More
 

IBM: Smart machines set to rule the world
IBM today took the wraps off of its eight annual "IBM 5 in 5" appraisal of the key technologies that could change high-tech life in the coming five years. Perhaps not surprisingly Big Blue this year says future tech developments will revolve around cognitive or smart learning systems that will learn, reason and involve human interaction like never before. Read More
 

Snowden speech to EU parliament could torpedo US trade talks
The head of the White House's intelligence committee warned the European Parliament on Tuesday that inviting whistleblower Edward Snowden to address them could torpedo a transatlantic trade agreement worth more than a!2 billion a year. Read More
 

 

INSIDER
CIOs Should Learn the Two Metrics That Matter
CIOs need to be prepared to explain how their expensive IT project will improve the numbers every CEO cares most about. Read More
 

 

How to trace a stolen MacBook: use Find My Mac to find stolen MacBook
Your precious Apple laptop has been stolen, and you are bereft and angry. But all may not be lost. If you have Find My Mac enabled on your MacBook you can track it, lock it, and even message the oxygen waster who lifted your laptop. Here's how to trace a stolen MacBook. Read More
 

2013 tech news quiz
Snowden, Ballmer, 3D handguns, iPhone 5s – this year had it all Read More
 

Security Threat Landscape: Predictions for 2014
Welcome to another edition of "Security Threat Landscape", a joint production between Network World and Fortinet. Keith Shaw and Derek Manky discuss some of the latest security threats via this monthly video podcast. This month, Derek rolls out some of his security predictions for 2014. Read More
 

Avago agrees to buy LSI for $6.6 billion
Semiconductor company Avago Technologies has agreed to buy storage and networking company LSI for US$6.6 billion in an effort to expand its data center offerings. Read More
 

 

SLIDESHOWS

Avaya builds massive Wi-Fi net for 2014 Winter Olympics

BYOD for 30,000 people creates extraordinary demands on the network.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Report accuses BT of supplying backdoors for GCHQ and NSA

2. Avaya builds massive Wi-Fi net for 2014 Winter Olympics

3. First Look: Gigabit Wi-Fi adapters

4. Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards

5. Juniper buys net optimizer WANDL for $60M

6. 2013: The 12 months of Cisco

7. Inside Dropbox's plans for enterprise domination

8. 2013 computer crime blotter

9. Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware

10. Advanced persistent threats now hitting mobile devices


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment