Issue highlights 1. 16 weirdest places you'll find Linux 2. Speedy attack targets Web servers with outdated Linux kernels 3. Symantec fires CEO, appoints interim replacement 4. INSIDER Is WAN Optimization Hardware Obsolete? 5. McGovern recalled as 'a catalyst of the computer industry' 6. 5 Ways to Prevent Data Loss in Mobile Environments 7. Top 10 States for IT Jobs 8. Samsung hopes to drum up interest for S5 with hands-on demos 9. Google’s ‘Project Tango’ heading to space 10. Syria hit by widespread Internet outage 11. Fitbit sued over rashes experienced by bracelet wearers 12. Security should no longer be 'cementing' the status quo 13. 10 (FREE!) Microsoft tools to make admins happier |
WHITE PAPER: 8x8, Inc Learn why enterprises increasingly switch to cloud-based VoIP unified communications, for benefits ranging from cost savings to improved customer satisfaction to better security, compliance and business continuity. Big wins include improved company unity, reduced management hassles and better support for mobile, global and distributed workers. Learn more >> |
Linux is everywhere, if you look for it. READ MORE |
Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday. READ MORE |
Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting a board member in charge while the security vendor searches for a permanent replacement. READ MORE |
We recently received a copy of a Netex-commissioned white paper called "The Death of the WAN Optimization Hardware Appliance: R.I.P." The paper, by a firm curiously named Dragon Slayer Consulting, predicts that WAN optimization hardware will soon be as obsolete as the buggy whip because virtualized server appliances will render it moot. We believe this prediction is wrong. Here's why. READ MORE |
WHITE PAPER: Nexsan Technologies Learn how the data protection features and capabilities of highly flexible and scalable unified SAN and NAS systems can benefit your organization’s efficiency, reliability and bottom line. Receive recommendations on how to measure storage performance in IOPS, latency and throughput and building the best configuration for your applications. Learn More>> |
In June 1967, when Patrick J. McGovern published the first issue of Computerworld it did something different. It reported on the computing industry from a user perspective. READ MORE |
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices. READ MORE |
Looking for an IT job? It only makes sense to go where the most technology companies are located. The 10 states listed here boast the highest number of IT firms. READ MORE |
Samsung Electronics is laying the groundwork for the launches of the Galaxy S5, Gear 2 smartwatch and Gear Fit with hands-on demos in more than 61 countries. READ MORE |
WHITE PAPER: CradlePoint Technology In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable mobile Internet connectivity to keep up. Learn More |
NASA is upgrading smartphones on space satellites called SPHERES with 3D-sensing Android smartphones developed by Google. READ MORE |
Syria was hit by what appeared to be an Internet outage that swept nearly the entire country, according to Internet monitoring companies. READ MORE |
Fitbit, a startup that makes wearable devices for activity tracking, is being sued following reports that users of its Force device developed skin rashes. READ MORE |
When considering the alarming number of mega-data breaches and other such security incidents as they occur almost daily, and then compare the announced "root causes" and "used attack paths" of the incidents with the current state-of-the-art strategies to defend against attacks, I have come to conclusion that, unfortunately, security (risk, audit, and compliance, and any other assurance functions) is more often than not only "cementing" the status quo, that is the currently used processes or ways of doing business in a somewhat "secure" fashion. READ MORE |
From migrating away from Windows XP to managing Active Directory, there's help at no cost. READ MORE |
WHITE PAPER: Spirent Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Learn More>> |
SLIDESHOWS 12 hot cloud computing startups to watch: Product photo gallery Cloud management, development, security and more. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. Google Graveyard: Here's what Google has killed so far in 2014 2. Why Google Apps is winning IT hearts and minds 3. Most ATMs will remain on Windows XP after Microsoft's pulls plug on OS 4. “We need more scientific mavericks” 5. Cisco gets fresh mid-range router competition 6. Microsoft's Lync surging as PBX choice in North America 7. Cisco's 10 most opportunistic acquisitions 8. Ex-Microsoft employee arrested, accused of stealing Windows RT, product activation secrets 9. Ex-Microsoft employee arrested, accused of stealing Windows RT, product activation secrets 10. 12 hot security start-ups you need to know | |
No comments:
Post a Comment