High-tech

High-tech
Light

Tuesday, June 3, 2014

The redesign of NetworkWorld.com

---------- Forwarded message ----------
From: "Network World Special Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 3, 2014 12:48 PM
Subject: The redesign of NetworkWorld.com
To: <aquarianm@gmail.com>
Cc:

  Miley Cyrus chosen to present Network World relaunch song | America's 6 top-paid CTOs
       
  Network World Special Alert

Forward this to a Friend >>>


The redesign of NetworkWorld.com
Welcome to the new NetworkWorld.com. We have overhauled the site to make it easier to navigate and, behind the scenes, migrated to a content management system that improves the customer experience for visitors using smartphones or tablets. Read More
       



Miley Cyrus chosen to present Network World relaunch song
Start All Over: Network World has a new homegrown publishing system Read More

America's 6 top-paid CTOs
Bonuses and stock options help push some chief technology officers' salaries into the millions. Read More
       

At WWDC, continuity across devices is the theme
Apple's "Continuity" initiative is all about using the right device for the right task at the right moment and shifting between those devices seamlessly. Columnist Ryan Faas explains. Read More         

COMPUTEX: Exclusive: first tablet with Intel's Broadwell
        We got an exclusive hands on with Llama Mountain, a tablet-laptop hybrid that runs on Intel's new but delayed Broadwell chip. Read More

GnuTLS library flaw could expose SSL clients, systems
A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library. Read More

Inside an attack by the Syrian Electronic Army
The Syrian Electronic Army (SEA) has become a bit of a name brand as far as low-level hacking groups are concerned. Their methods are simple, but effective. They spend most of their energy on propaganda and self-promotion, but lately they've taken to targeting media organizations (or the people associated with them), and IDG Enterprise is no exception. Through internal communications during the attack, my investigation into the incident, and other sources of data, here's a first-hand view of what it's like to be in the middle of a security incident, from a known attacker, and avoid major problems.Just another day on the job: It was a typical Monday in May at CSO. However, elsewhere within IDG Enterprise, a story was about to hit the wires that could cause some issues. Ira Winkler, a known security expert and President of Secure Mentem, was about to have an editorial published on Computerworld, which focused largely on the SEA.To read this article in full or to leave a comment, please click here Read More

IBM brings development methodologies to the cloud
        While practices to speed programming have been around for a decade, only recently have they caught the eye of the enterprise manager looking for a competitive edge. Now, IBM is updating its Bluemix portfolio of cloud services to help companies save time in deploying new applications by using these new programming methodologies. Read More

 
 
 

SLIDESHOWS

15 more weird things in the Internet of Things

The Internet of Things is growing, and the things are getting weirder by the day.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. TrueCrypt's abrupt demise 'puzzling, bizarre'

2. Cisco purchase of CIA-funded company may fuel distrust abroad

3. How MIT and Caltech's coding breakthrough could accelerate mobile network speeds

4. What's really behind the Microsoft-Salesforce deal

5. America's 6 top-paid CTOs

6. ITworld cartoons 2014: The year in geek humor

7. iPhone 6 rumor rollup for the week ending May 30

8. The PSTN Transition to VoIP: Security Must be Addressed

9. Beware the next circle of hell: Unpatchable systems

10. How consumers are holding back retail tech advances


 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment