Network World Daily News PM | | Cisco CEO John Chambers may retire this fall amidst a massive reorganization that could lop tens of thousands of employees off its workforce. So says Scott Raynovich, author of the tech/business sheet The Rayno Report.Raynovich cites several sources "familiar with the chatter inside the company" for his prediction, which he touts as a major scoop for his organization. The timing would be consistent with what Chambers said back in 2012: that he planned to retire in two to four years, and a successor would be one of 10 Cisco executives.To read this article in full or to leave a comment, please click here | | Issue highlights 1. INSIDER IT grads get to know GE 2. Malwarebytes aims to stop zero-day exploits on Windows 3. DDoS attacks against Feedly inconvenience millions … and it's partly Google's fault 4. Microsoft developing smartphone batteries that can last a week 5. OnLive taps cloud gaming tech for business use, again 6. Microsoft previews cloud-based Web apps proxy service in Azure 7. 10 'geek dads' share tales and tips from the IT trenches 8. Hackers use pathetic passwords just like everyone else 9. HP says 'The Machine' will supercharge Android phones to 100TB 10. iPhoneys: Apple iPhone 6 concepts | WEBCAST: Dell SecureWorks Training employees to understand the risk they create for your organization when they don't consider security in their day-to-day activities is a challenge for most IT and IT security organizations. Changing behavior is always difficult, especially when security awareness programs lack a well-defined approach and dedicated resources. I Learn more | At GE, a global IT recruiting program helps bring new computer science graduates into the company and expose them to different facets of the business.Computer science graduates rotate through four different IT assignments during a two-year program at General Electric. READ MORE | Malwarebytes today said it has begun shipping Windows-based software intended to detect and block unknown zero-day exploits. Malwarebytes says the software, called Anti-Exploit, can work as additional protection alongside traditional anti-malware."It could be used with Symantec Endpoint, for instance," said Pedro Bustamante, director of special projects at Malwarebytes. It works by shielding applications running on the computer. If it's set to guard Adobe Reader, for example, Anti-Exploit will watch what files it might seek to run, and if processes indicate it's a malicious PDF, for example, Anti-Exploit will "stop the process before the exploit can execute," Bustamante says. Anti-Exploit is based on technology acquired when Malwarebytes bought Zero Vulnerability Labs last year.To read this article in full or to leave a comment, please click here READ MORE | Bad guys have been attacking Feedly's website for two days now – demanding ransom -- and it's somehow Google's fault?Not exactly, although millions of users did flock to Feedly in the wake of Google's decision to deep-six Google Reader … and those millions – including yours truly – have been denied access to our favorite RSS feeds while Feedly fends off these bad guys.From the Building Feedly blog: 7:26am PST: We are currently being targeted by a second DDoS attack and are working with our service providers to mitigate the issue.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: APC by Schneider Electric There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more | If you go back a decade to when mobile phones just made phone calls and sent text messages, it was not uncommon to go a week in between charges. Now, some of us keep cigarette plug chargers in our cars for our phones.That's progress.Actually, battery power has not been slacking. Ranveer Chandra, senior researcher for mobility and networking at Microsoft Research, told the crowd at MIT Technology Review's Digital Summit in San Francisco that battery power storage density has doubled over the last 15 years. The problem is we have large OLED high-definition screens, touchscreens and quad-core processors in these phones. So the pace of component development has exceeded the pace of battery innovation.To read this article in full or to leave a comment, please click here READ MORE | On Thursday, OnLive launched CloudLift Enterprise, the company's second attempt to adapt its cloud gaming services to the business space. Until now, OnLive has been the flag-bearer for cloud gaming, which uses low-latency connections between a thin client app on a PC or mobile device and a back-end server. Its CloudLift technology takes games that users have bought on Valve Software's Steam service, or via OnLive, and accelerates them using its own high-end gaming machines. Now, the company has adapted that technology for business use. Working from the argument that PC games are about the most graphics-intensive application a user can buy, OnLive's CloudLift Enterprise service takes the same approach to "graphics-intensive applications" like CAD programs, medical imaging software, and more.To read this article in full or to leave a comment, please click here READ MORE | Azure AD Application Proxy can help support secure remote access for BYOD programs READ MORE | WHITE PAPER: VCE This case study highlights how Vblock System enabled them to speed the rollout of new infrastructure by 75% while reducing IT implementation costs by 50%. Learn More | Back in the day, geek dads wore plastic pocket protectors, taught their kids long division on the back of mainframe punch cards, and worked long, long hours. Often, they couldn't be there for baseball games or bedtimes.Today's tech dads are a different breed -- still putting in long hours, but working just as hard to be there for their kids' milestones, large and small.To read this article in full or to leave a comment, please click here READ MORE | It turns out that many hackers employ the same weak password techniques as the least technologically savvy among us. READ MORE | HP says its new computer architecture could massively increase the storage in mobile devices READ MORE | Moving beyond iPhone 5S and 5C, new designs feature bigger screens and more magic READ MORE | WHITE PAPER: HP This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight -- a Security Information and Event Management (SIEM) solution from HP -- applies these techniques to spot and stop attacks. Learn More | | | | | | | |
No comments:
Post a Comment