High-tech

High-tech
Light

Friday, March 14, 2014

Happy Pi Day! 28 facts about pi you probably didn't know

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Mar 14, 2014 8:10 AM
Subject: Happy Pi Day! 28 facts about pi you probably didn't know
To: <aquarianm@gmail.com>
Cc:

Best ways to Celebrate Pi Day 2014

MIT preps for Pi Day the pie way

Network World Daily News AM
March 14, 2014
Share this email

Happy Pi Day! 28 facts about pi you probably didn't know

Happy Pi Day (3/14)! To celebrate, here's more than you ever wanted to know about pi

READ MORE
 

Issue highlights

1. Best ways to Celebrate Pi Day 2014

2. MIT preps for Pi Day the pie way

3. 10G and 12 years later...

4. Using Amazon Kindle Fire HDX Tablets in the Enterprise

5. Network World has an Instagram account! Now what?

6. Phishing campaign targets Google Docs, Drive users

7. Target says it investigated but dismissed early signs of breach

8. China's WeChat cracks down on accounts, amid nation's growing censorship

9. Microsoft's Hybrid Cloud - Extending the Datacenter to Windows Azure in the Cloud

10. NSA denies Facebook snooping as Zuckerberg lays into Obama

11. 12 hot cloud computing startups to watch: Product photo gallery

RESOURCE COMPLIMENTS OF: Dell

Achieve Deeper Network Security and Control

Next-generation firewalls (NGFWs) revolutionized network security. Traditional firewalls that only focus on stateful packet inspection and access control rules are ineffective in today’s advanced-threat environment. To protect your organization from threats, your NGFW must be able to deliver a deeper level of network security. Learn why Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with the proper level of network security.

Best ways to Celebrate Pi Day 2014

Pi is 3.14 (about), so that makes March 14 Pi Day READ MORE

MIT preps for Pi Day the pie way

The second video may be even funnier than the first, but it was made second so second it shall stay. The first - called "Preparing for Pi(e) Day" - represents the work of the bloggers at the MIT Admissions Department and helps announce that Friday, March 14, in addition to being Pi Day, will also be the day that MIT applicants find out if they're in. READ MORE

10G and 12 years later...

It took 12 years for 10G Ethernet to unseat Gigabit Ethernet as the predominant Ethernet networking technology in the data center. Ten gigabit Ethernet surpassed Gigabit Ethernet in the latter part of 2013 after some "robust" year-end growth, says Crehan Research. READ MORE

RESOURCE COMPLIMENTS OF: SolarWinds

Tales from the Dark Side of the Network

Frustrated with your big IT Network Management System? In this exclusive footage, IT pros tell their side of the story...the dark side. Let SolarWinds ® Software bring light to the darkness. Save Time. Save Money. Save the Network with SolarWinds Network Performance Monitor. Watch now and don’t let inefficient network management systems take your team to the dark side.

Using Amazon Kindle Fire HDX Tablets in the Enterprise

A couple of months ago, Amazon sent me its (then) new Kindle Fire HDX 8.9" tablet for review. After spending some time with the device, I wrote a piece comparing its strengths to the most popular tablet available today: Apple's iPad. READ MORE

Network World has an Instagram account! Now what?

Network World has religiously expanded its presence online by creating social network accounts on Facebook, Twitter, Google+ (hello out there?), LinkedIn (here and here), Pinterest (we look go READ MORE

Phishing campaign targets Google Docs, Drive users

Symantec has spotted a phishing campaign leveraging Google Drive that would be hard for users to discern as a scam. READ MORE

WEBCAST: Ruckus Wireless

Mining Profit from Location Based Services

Businesses understand the high value of getting users just the right content at precisely the right time and at the right place. But delivering on such promise and potential means knowing where these people and their devices are located. That’s where location-based services are rising to the challenge, as this insightful webcast will demonstrate. Learn more!

Target says it investigated but dismissed early signs of breach

Target said Thursday it investigated but ultimately dismissed early signs of a data breach, a decision it likely regrets after suffering one of the largest payment-card and personal-data breaches on record. READ MORE

China's WeChat cracks down on accounts, amid nation's growing censorship

One of China's most popular messaging apps, WeChat, has started shutting down certain accounts known for their political writings, the latest sign that the nation is stepping up its censorship of the Internet. READ MORE

Microsoft's Hybrid Cloud - Extending the Datacenter to Windows Azure in the Cloud

For more than two decades, organizations built datacenters and hosted their own servers and systems within their datacenters. The role of the Information Technology (I.T.) department was to keep these systems within their control running in an optimal manner. That included keeping the systems patched and updated, servers and applications backed up, and ensuring all systems were fully operational.... READ MORE

NSA denies Facebook snooping as Zuckerberg lays into Obama

An article that accused the National Security Agency of impersonating Facebook to spy on U.S. citizens has triggered a denial from the NSA and a reprimand for the U.S. president from CEO Mark Zuckerberg. READ MORE

12 hot cloud computing startups to watch: Product photo gallery

Cloud management, development, security and more READ MORE

WEBCAST: HP and Intel®

Cloud Knowledge Vault

According to market research, 59 percent of enterprises are still identifying IT operations that are candidates for cloud hosting. Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources in this HP & Intel® Cloud Knowledge Vault. Learn More

SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Embarrassing stories shed light on U.S. officials' technological ignorance

2. Why IBM thinks Windows Phone is best for the enterprise

3. Computer science enrollments rocketed last year, up 22%

4. The fascinating 50

5. Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks

6. iPhone Air: Latest iPhone 6 concept video has fanboys fired up

7. Massive Bitcoin mining rig earns $8 million per month

8. Cisco shows Rob Ford no respect

9. March 2014 Patch Tuesday: Microsoft closes critical holes in IE, Windows

10. Cisco on mission to outfit all office rooms with video conferencing systems

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment