Issue highlights 1. 13 pieces of classic software whose code is now accessible 2. Bill Buckner is the butt of painfully funny 404 error page 3. IT Leader or IT Manager? How to Be the Best of Both 4. Will the Internet of Things Become the Internet of Broken Things? 5. INSIDER Top perks that IT professionals should ask for 6. Americans are scared about the future of drones, robots, and wearables 7. How a cyber cop patrols the underworld of e-commerce 8. The Future of Network Security in the Data Center – Flexible, Distributed, and Virtual 9. For Red Hat, it's RHEL and then…? 10. Google Glass to get a workout from Dutch firefighters 11. Tor anonymity network to shrink as a result of Heartbleed flaw 12. 10 tech products that are built to last |
RESOURCE COMPLIMENTS OF: CITE Conference + Expo You've heard about consumerization...but how can you use it to give your organization a competitive edge? Find out at the third annual Consumerization of IT in the Enterprise (CITE) April 27–29 in San Francisco. Learn how consumer-driven technology can transform your business, your workplace, and your customer relationships. Learn more |
The source code behind proprietary software doesn't always remain hidden forever. Here are a baker's dozen examples where the code behind well-known applications has come to light READ MORE |
Baseball fans will require no explanation to appreciate this 404 error page delivered by the newly redesigned Boston.com. READ MORE |
In his book, "Essential Drucker: Management, the Individual and Society," Peter F. Drucker says, "Management is doing things right; leadership is doing the right things." READ MORE |
Fifty billion devices will connect to the Internet in the next few years. It's up to vendors to make sure they do, in fact, connect to the Internet -- and provide reliable data, security and customer experience. Otherwise, analysts warn, the future may bring an Internet of Broken Things. READ MORE |
WHITE PAPER: HP and Intel® Six Common and Costly Myths that surround Data Center transformation. Learn More>> |
You've been slaving away at your job since the economic downturn, taking on more work with no raise in pay and believing a light would one day appear at the end of the tunnel. According to both DICE and Robert Half Technology, that day is here. READ MORE |
Concerns over technology that is already controversial today trump the overall optimism. READ MORE |
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does. READ MORE |
Think of a modern enterprise data center. There are likely hundreds of physical servers hosting thousands of VMs. Individual systems are connected via 10gbE links that likely feed 40gb cores. Local data centers connect over DWDM, remote data centers use MPLS, and cloud data centers chat amongst each other over high-speed VPNs. READ MORE |
WHITE PAPER: Crittercism Effective mobile application performance management optimizes application availability and response time, ensuring the best user experience. Learn the difference the right management tools make and why tools that monitor the network or focus only on performance at the device level are not enough. Read now! |
Red Hat is hosting its annual summit this week - this year in San Francisco - where the company is seemingly basking in the glory of making more than a billion dollars off a free open source project. READ MORE |
Can Google Glass help first responders work more effectively? Firefighters in Amsterdam want to find out, and plan to try out the wearable-of-the-moment in training scenarios and at accident scenes. READ MORE |
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. READ MORE |
No shiny new things here. These are the workhorses of the technology world. READ MORE |
WHITE PAPER: HP and Intel® Xeon® processors In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More |
SLIDESHOWS 10 Big Data startups to watch These 10 startups to watch were chosen based on third-party validation, experience, and market potential. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. The IRS uses computers?! The horror! 2. First look: Ubuntu 14.04 LTS 3. Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test 4. Still deploying 11n Wi-Fi? You might want to think again 5. How users are fixing Windows 8.1 Update install problems 6. 9 Things You Need to Know Before You Store Data in the Cloud 7. Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab 8. Docker becomes de facto Linux standard 9. Kill switches coming to iPhone, Android, Windows devices in 2015 10. Microsoft releases new-and-improved Threat Modeling Tool 2014 | |
No comments:
Post a Comment