High-tech

High-tech
Light

Wednesday, December 31, 2014

Test your knowledge: Network World's 2014 tech news quiz

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 30, 2014 9:01 PM
Subject: Test your knowledge: Network World's 2014 tech news quiz
To: <aquarianm@gmail.com>
Cc:

  The year in tech industry apologies | Notable deaths of 2014 from the worlds of technology, science & inventions

 
  Network World After Dark  

Test your knowledge: Network World's 2014 tech news quiz
Think you keep up with tech news? Take Network World's quiz on the major events that dominated the tech world in 2014. Read More
 


: Venafi

IT Security's Responsibility: Protecting Mobile Certificates
When it comes to protecting mobile certificates, IT security leaders must act responsibly - with next-generation trust protection. Find out how Forrester rates IT security leaders' knowledge and understanding of keys and certificate technologies for mobile. Learn More

: Venafi

Gaps In SSH Security Create An Open Door For Attackers
As an IT security leader, are you on top of SSH security for your organization? It's key to next-generation trust protection. Find out what Forrester reveals as gaps in that security—gaps that could put your organization in peril. Learn More

The year in tech industry apologies
SorryImage by Flickr/ Neil SloranceTo read this article in full or to leave a comment, please click here Read More
 

Notable deaths of 2014 from the worlds of technology, science & inventions
Remembering2014 has been a particularly tough year for those of us at IDG who mourn the loss of Patrick McGovern, founder and chairman of the company, this past March. Here's our tribute to Pat and others who contributed much to our lives but are with us no longer. (IDG News Service contributed to this report.)To read this article in full or to leave a comment, please click here Read More
 

HP Quietly Rolls Out a Touch-Enabled Chromebook 14
  Hewlett-Packard said it would introduce a touch-enabled version of the Chromebook 14, and it's finally landed in the U.S., just a few days before Christmas. The computer maker recently released the $440 HP Chromebook 14-x050nr Touch through its online store. The new model is upgraded from the latest base edition Chromebook 14, which HP introduced at IFA Berlin in September. HP bumped the display resolution up to 1920-by-1080 from 1366-by-768, and the new laptop also doubles the storage and RAM to 32GB and 4GB, respectively. The major change, however, is of course the addition of touch.To read this article in full or to leave a comment, please click here Read More
 

7 leadership tips for women tech executives
Leadership Tips for Female Tech ExecutivesThe first 90 days of every executive's tenure at a new company is fraught with potential pitfalls, but - as unfair as it is -- female executives are held to a different, stricter standard in the workplace. Women execs must not only prove their competence, but are judged on their personalities, appearance and even their speech patterns in a way few male executives are."Female executives face the challenge of presenting themselves accurately in their first 90 days on the job. They need to balance proving both their competence and skill set with showing their true work persona. Male executives are judged first and foremost on how they do a job, and perhaps secondarily on their office demeanor and appearance. Women are immediately judged on both, and therefore need to set goals around performance in both areas," says Danielle Tate, founder and CEO of MissNowMrs.com, an online name change service.In 2013, women made up 47 percent of the U.S. labor force, but held fewer than 14 percent of the Fortune 500 executive officer positions and fewer than 17 percent of the Fortune 500 board Seats, according to Catalyst, a nonprofit dedicated to expanding opportunities for women in the workplace.To address this issue in the long-term, much work is being done to recruit women into IT and other science, technology, engineering and math (STEM) fields and many companies and nonprofit organizations exist to help middle-school, high school and college girls and women get involved in STEM careers,. But to help you today, CIO.com asked female executives to weigh in on how female executives can address these challenges and overcome these obstacles. Avoid Being Too NiceWomen are often raised and socialized to be "people pleasers;" and learn to focus first on the needs of others instead of themselves, according to Penny Locey, vice president at Keystone Associates, a career management consulting firm. That can negatively impact their ability to gain respect in the workplace."Many women, even those in senior roles, default to people-pleasing mode when they take a new position, which can undermine their power in an executive position. They're concerned about winning the approval and respect of their peers, superiors and direct reports, so they may hesitate to take a tough stand for fear of appearing dictatorial or overly controlling. Their natural warmth and empathy, when overused, may result in their being labeled 'too nice,' which, in most business settings, is code for 'indecisive,' 'tentative' or 'unassertive,'" says Locey.Instead, Locey says, women should focus their behaviors on earning the respect of their reports and teams rather than on simply being liked, even if their decisions aren't applauded by everyone."Obviously, you don't want to be a dictator or make harsh decisions arbitrarily, but you need to establish early on that you are firm but fair - that you won't back down from tough choices and that will help your peers and reports develop respect for you and your role. Otherwise, you risk losing any power you might have," says Locey.Make sure you're looking objectively at your habits and behavior and try to modify those that dilute your influence, says Stephanie Daniel, senior vice president at Keystone Associates. For example, in an effort to be viewed as accommodating and thoughtful in meetings, do you do any of the following: Tend to wait to offer your insights and ideas until everyone else has spoken? Soften your voice or apologize for expressing an unpopular view For example, saying, "I'm sorry, but I don't think…" or "You probably won't agree with me on this, but…"? Do your declarative statements sometimes end in a question mark? For example, 'I think that the customer will be pleased with our proposal, don't you?' And pay attention to your body language, too, says Daniel. Your body language and how you use eye contact could subconsciously be projecting the wrong message. In a group, are you inclined to focus your attention on just one person? Or, do you scan the room to ensure that your message is being heard by all participants? Are you more likely to sit in the chair that is farthest away from the conversation; an unconscious signal that you're not interested in or don't feel qualified to participate in discussions? Subtle changes in your approach will make a significant difference over time and you will see a shift in the way people relate to you, notes Daniel. "The qualities that make you an engaged and collaborative leader will remain intact; your image as a decisive and confident leader will be strengthened, and the "too nice" moniker that's been attached to you will become a thing of the past," says Daniel.Consider Power, Not Just Affiliation and AchievementWhether it comes naturally to you or not, to succeed in a new role, you need to quickly assess who has the informal power in an organization as well as the formal power; who is in favor and who is not; which ideas and values are important to the company and which are not. "At first, many people will try to befriend you, and you need to get off on the right foot with everyone, of course, but who you align with shows a lot about the type of leader you will be and how much respect you'll earn," says Locey. Maintain a professional distance while you build alliances and get a sense of how the company fits with your own mission, culture and values. "Watch who defers to whom, who is included and excluded from meetings and whose views are solicited. You don't need to be rude or be cold and icy to those who aren't 'in favor,' but you should know who holds the power in the organization so you can fit yourself within that power structure," says Locey. Because power is often bestowed upon those who do what matters most to those already in power, study what behaviors or achievements are rewarded and aim to replicate those types of "wins" early on, Locey says."If your role comes with power through your title or scope, make sure you are included in all the meetings and communications you should be, too. Often, female execs will stay quiet far longer than they should. Don't be demur - speak up in meetings where your voice would be expected," says Daniel.Attend to Your Own GoalsBy 90 days in, you will have more work than you can do; you will be focused on deliverables and you will likely have put on the back burner why it is you took the position as it relates to your career goals. Make sure you're taking time to review your personal goals for this new position and, if necessary, reexamine your game plan. "Assess if you are gaining the skills and knowledge that you came here to get [and] that you are in a position to obtain the right visibility, boost your reputation and maintain your network. If you are off target to achieve your game plan, you should re-engage with peers, superiors, your team and other stakeholders to strengthen relationships, open the lines of communication and implement action plans to support execution of key achievements," says Daniel.Stand Behind Your ValuesWomen's socialization as empathetic, nurturing, accessible and approachable caregivers in the workplace can be a huge asset, and if you're this type of leader, by all means, use that to your advantage, says Emily He, CMO at Saba Software."Women leaders with these traits have a lot of advantages managing Gen-Y and Gen-Z. When millennials talk about what they want in a manager, these qualities are often at the top of their lists -- so if you have it, use it. People - not just women - with these traits make better managers because of their empathy, open communication, frequent feedback and the fact that they're very approachable and accessible, "says He.Regardless of whether you consider yourself to have these traits, in the workplace you have to be clear on the values you hold. "Talk is cheap and women are judged much more harshly. Therefore, it's doubly important to make our actions reflect our words. You must define what's important to you and make that come through in every interaction you have and every decision you make," says He.Be Approachable and Venture Beyond the Confines of Your OfficeIf you're not the extroverted, nurturing, approachable type, that's absolutely acceptable -- just understand that your personality could be perceived as "standoffishness," so you must make an extra effort to connect with your peers, your teams and your superiors outside of the formal confines of meetings, according to Locey. "As you're trying to build alliances and gauge the power structure in your new position, remember that you must actively engage with your colleagues. Most employees want to be seen and noticed by executive staff, and something as simple as a brief, informal check-in with you can help build your image as an approachable and accessible leader while not diminishing your authority or power," says Locey."If you are spending too much time in your office, make it part of your daily routine to be accessible, open and part of the team by being visible to employees - go to the lunch room, walk over to employee's desk to have a conversation instead of sending an email, walk through the cubicles, and listen or make small talk," says Locey.Don't be Afraid to Confront Bias If/When You See ItIn some workplaces, the "boys club" still exists, and as a female executive, you'll need to tackle it head-on if you encounter bias. From "sins of omission" like not being invited to an executive golf outing or to a team dinner because it's assumed you must get home to your family, or being excluded when male executives continue conversations in the men's room, biases and exclusion is something all female execs must deal with, according to Locey."You don't have to be accusatory, but make sure to point out that, because of your role, you need to be present when decisions are made. Blame it on being 'the new kid' if you must to take the sting out of it, but you have to confront the issue and make sure others in leadership know it's not acceptable," Locey says.Daniel advises not allowing any incidents to publicly rattle you, but to deal with it afterwards in a private setting. In many cases, it's easily resolved and perpetrators didn't even realize how their language, actions or their humor was perceived."If I encounter an insult or a slight, I typically will not engage with that person publically until we've finished what we're trying to accomplish but in private, I will not shy away from saying out loud, 'I'm going to be very plain, this is what I saw and this is how I was impacted and how it also impacts all the other women here at the company when they see this happening.' Often, that will put a stop to it," says Daniel.Remember That 'Rome Wasn't Built in a Day, But They Were Laying Bricks Every Hour'Use the first 30 to 90 days to assess risks and opportunities and to map out a plan for the future, knowing that you'll make adjustments to the goals you set and plans you made based on your observations. While earning quick wins early on will be essential to your immediate success, it is your longer-term strategy and vision that will ultimately make a greater impact, Locey says.Remember that the male-dominated corporate culture is changing. The IT industry is becoming more aware of its biases and is opening up to change, diversity and inclusion. As a female executive, you can effect change by building rapport, earning trust and gaining credibility with every encounter you have. "It's about creating those connections, earning trust and respect one person at a time. It can seem really daunting to think about changing the overall attitude of the entire company, much less the entire industry, so focus on what you can do, in your role, with every person you work with. Build change from the ground up," says He.To read this article in full or to leave a comment, please click here Read More
 

7 Things Microsoft Killed in 2014, and 1 That Got Off the Hook
2014 has been a year of major changes at Microsoft, not the least of which was the naming of Satya Nadella to replace Steve Ballmer as CEO. But the company also registered plenty of changes across its product lines, making way for new offerings by scuttling or renaming old ones. Here's a look back at 2014 (and here's the 2013 graveyard): Nick Perla, Flickr Windows XP supportTo read this article in full or to leave a comment, please click here Read More
 

Google Graveyard: Here's what Google has killed in 2014
Google beats spring cleaning rush, nixes apps and services Read More
 

2014 technology industry graveyard
Microsoft, Google, Intel, BlackBerry and others bid farewell to brands, projects and more. Read More
 

What the Sony breach means for security in 2015
  The recent (and perhaps ongoing) Sony breach was certainly one of the worst corporate data breaches we have seen to date. As 2014 draws to a close, no one knows the details with certainty of who the perpetrator was. Even so, it's undeniable that it's a breach that will forever change the way Sony does business. [ Questions remain after FBI charges North Korea with attack on Sony Pictures ]To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Teaching entrepreneurship family style
  Families highlighted in this article: Bob Lozano, founder of Appistry, Paylinx; sons Gabe Lozano of Lockerdome and Dominic Lozano of Contegix Susan Elliott, founder of SSE and daughter Elizabeth Niedringhaus, SSE's current president Deborah Estrin, Cornell professor and founder of Open mHealth; sister Judith Estrin, jLabs, Cisco, Network Computing Devices, 3Com Richard Becherer, business professor at the University of Tenn. and daughter Brooke Ross, founder of ElderNavTo read this article in full or to leave a comment, please click here(Insider Story) Read More

 

 

SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google built its own self-driving car

2. 7 Things Microsoft Killed in 2014, and 1 That Got Off the Hook

3. Cisco's greatest hits, 2014 edition

4. CentOS 7: The perfect gift for the Linux do-it-yourselfer

5. 10 predictions for IT in 2015

6. 6 simple tricks for protecting your passwords

7. SDN in 2014: A year of non-stop action

8. In Cisco tiff, Arista taps Gandhi

9. Hotel group asks FCC for permission to block some outside Wi-Fi

10. Cyberattack on German steel factory causes 'massive damage'


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


The weirdest, wackiest and coolest sci/tech stories of 2014

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 31, 2014 8:01 AM
Subject: The weirdest, wackiest and coolest sci/tech stories of 2014
To: <aquarianm@gmail.com>
Cc:

Apple-IBM partnership off to 'impressive' start. View it in your browser

How to work out the kinks in the cloud. View it in your browser

NETWORKWORLD
Network World Daily News AM
December 31, 2014

The weirdest, wackiest and coolest sci/tech stories of 2014

The weird and wackySifting through the sometimes wacky world of high-tech can be a lot of fun. This year we have a mix of great stories about space, truly advanced software, drones and one story about a guy who has an antennae attached to his skull. What more could you want? Take a gander.RELATED: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. Apple-IBM partnership off to 'impressive' start

2. INSIDER How to work out the kinks in the cloud

3. The four Mac security options everyone should know

4. Suing Arista was always the plan

5. 16 terrible computer pranks that could get you fired

6. The Onion's 10 greatest gags about Google

7. 3 Snapchat Alternatives for Self-Destructing Messages

8. 11 sites that can feel Sony's pain

9. Point-of-sale malware creators still in business with Spark, an Alina spinoff

10. 6 aging protocols that could cripple the Internet

11. BlackBerry Classic review: A killer smartphone for keyboard lovers

12. How colleges are failing their students

13. From ebola to Flappy Bird: These are the most popular Google Searches of 2014

14. The year in tech industry apologies

15. 12 most eye-popping VC tech deals of 2014

: Venafi

Get Ready for PCI DSS v3 Deadlines

Are you prepared for PCI DSS v3? The standard demands that IT security leaders have more visibility and security over keys and certificates. Find out what you need to know about next-generation trust protection to lock down your mobile environment. Learn More

Apple-IBM partnership off to 'impressive' start

Apple and IBM last week kicked off their five-month-old partnership with an "impressive" 10-pack of focused mobile business apps catering to sectors ranging from financial to law enforcement."The three that I've seen were pretty impressive," said Van Baker, an analyst at Gartner. "They're very complex, with some drawing from three, four or more separate data sources."+ ALSO ON NETWORK WORLD... READ MORE

INSIDER

How to work out the kinks in the cloud

Blame it on the public cloud service providers. It was, after all, the Amazons of the world that raised the bar by making the provisioning of IT resources look so easy. Why should users have to wait? If I can get it quickly and easily there, the reasoning goes, why can't I get the same agility from my internal data... READ MORE

The four Mac security options everyone should know

As our lives increasingly go digital, security is a major concern not only for the various online services we use, but also for the devices on which we save our data. Chances are that if you're reading this article, you own a Mac. And on your Mac, you'd like much of the work you do on it to be kept... READ MORE

Suing Arista was always the plan

Suing Arista was always the plan. It appears there was no intention to attempt to negotiate a royalty arrangement with the company after Cisco discovered potential infringement of its patents and copyrighted material.CEO John Chambers didn't answer our question last week on whether Cisco did indeed attempt to hammer out a royalty deal with Arista. He said he couldn't comment... READ MORE

16 terrible computer pranks that could get you fired

Look, you're an adult human being. You're better than this. Don't do any of the things in this slideshow. READ MORE

Webcast: IBM Corporation

Why Your Virtualization Matters

Over 61,000 virtualization customers have weighed in. Join the webcast and hear how other companies like yours are using virtualization to their benefit. Learn More

The Onion's 10 greatest gags about Google

Targeting Google"America's Finest News Source," better known as The Onion, has been poking fun at Google for more than a decade. Here are 10 of what we believe are its better efforts.Teacher Just Hopes They Never Google HimPublished: Aug 22, 2012To read this article in full or to leave a comment, please click here READ MORE

3 Snapchat Alternatives for Self-Destructing Messages

A number of embarrassing emails from Sony execs recently leaked during the company's high-profile hacking scandal — enough to make some organizations rethink how their workforce uses email.One way companies can protect themselves from email hacks is to stop using it for sensitive messages (or insensitive messages, given some of the racist remarks the Sony hack exposed). The upcoming BlackBerry/Boeing phone that... READ MORE

11 sites that can feel Sony's pain

Sony isn't the only oneImage by Craig SunterSure the Sony hack has taken up all the headlines of late, but there is a laundry list of other breaches that have taken place all over the world. Here are a few incidents in the past couple of years that resulted in the release of password information. This list was compiled in... READ MORE

Point-of-sale malware creators still in business with Spark, an Alina spinoff

A malware program dubbed Spark that steals payment card data from compromised point-of-sale (POS) systems is likely a modification of an older Trojan called Alina, and highlights a continuing, lucrative business for cybercriminals.Spark steals card data from a compromised system's RAM (random access memory) when it's being processed by specialized software running on the machine. Similar memory scraping malware was... READ MORE

6 aging protocols that could cripple the Internet

Internet protocols on the brinkImage by Kheng ho TohThe biggest threat to the Internet is the fact that it was never really designed. Instead, it evolved in fits and starts, thanks to various protocols that were cobbled together to fulfill the needs of the moment. Few of those protocols were designed with security in mind. Or if they were, they... READ MORE

Webcast: Fortinet

Increase Revenue with WiFi & Retail Presence Analytics

Many WiFi Retail Presence Analytics platforms promise the world, but provide little more than a collection of reports and meaningless data. Fortinet Presence Analytics is different, delivering a platform that helps you better understand customer behavior, engage more closely with your customers and actually influence their purchasing decisions. Learn more >>

BlackBerry Classic review: A killer smartphone for keyboard lovers

If you're still using a BlackBerry smartphone with a "physical" QWERTY keyboard, or if you've switched platforms but still harbor fantasies about a return to the good old days when you didn't spend as much time cursing your on-screen keypad as you do typing on it, the BlackBerry Classic is the smartphone you've been waiting for.BlackBerry returned to its roots... READ MORE

How colleges are failing their students

Most traditional four-year colleges are great at teaching students theoretical knowledge, critical thinking, history, literature and even computer science, but where these institutions fall short in a key area: teaching graduates the skills they need to land jobs after school and manage their careers.MORE ON NETWORK WORLD: Tech CEOs' first jobs "There's a major disconnect between what colleges believe their... READ MORE

From ebola to Flappy Bird: These are the most popular Google Searches of 2014

Google just released its annual retrospective on what the world was searching for in 2014. The company has apparently given up on calling its year in review the Google Zeitgeist and opted for the more humble "Year in Search." The lists include everything from top trending overall searches to top trending GIFs.ALSO ON NETWORK WORLD: Google Graveyard: Here's what Google... READ MORE

The year in tech industry apologies

SorryImage by Flickr/ Neil SloranceTo read this article in full or to leave a comment, please click here READ MORE

12 most eye-popping VC tech deals of 2014

While the three largest venture capital deals of the year in the technology industry went to consumer-focused startups, most of the other top investments went to companies building products that could reshape the enterprise IT landscape. Final numbers for the amount of venture capital money poured into startups in 2014 have not yet been tallied, but already experts say 2014... READ MORE

White Paper: IBM

Reduce loan processing with IBM Connections Cloud

Working with IBM Business Partner Silanis Technology Inc., Signature Mortgage implemented a cloud-based solution using Silanis e-SignLive integrated services and the IBM SmartCloud Engage social collaboration service. Signature Mortgage now processes loans in less than 25 days, compared to a national average of 45 to 60 days, and loan volume Learn More>>

SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google built its own self-driving car

2. 7 Things Microsoft Killed in 2014, and 1 That Got Off the Hook

3. Cisco's greatest hits, 2014 edition

4. CentOS 7: The perfect gift for the Linux do-it-yourselfer

5. 10 predictions for IT in 2015

6. 6 simple tricks for protecting your passwords

7. SDN in 2014: A year of non-stop action

8. In Cisco tiff, Arista taps Gandhi

9. Hotel group asks FCC for permission to block some outside Wi-Fi

10. Cyberattack on German steel factory causes 'massive damage'

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **