High-tech

High-tech
Light

Saturday, June 21, 2014

What Bill & Melinda Gates told Stanford grads (transcript)

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 18, 2014 7:51 AM
Subject: What Bill & Melinda Gates told Stanford grads (transcript)
To: <aquarianm@gmail.com>
Cc:

10 amazing features Windows 8 and Windows Phone 8 need to share

Why the Tail-F acquisition is a big win for Cisco

Network World Daily News AM
June 18, 2014
Share this email

What Bill & Melinda Gates told Stanford grads (transcript)

L. A. Cicero, via Stanford News Service Following is the text of the address by Bill and Melinda Gates, philanthropists and co-chairs of the Bill & Melinda Gates Foundation, as prepared for delivery at Stanford University's 123rd Commencement on June 15, 2014. Microsoft co-founder Bill Gates recently stepped aside as Microsoft chairman and is now an advisor to the CEO. See a video recap of the Stanford speech here.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. 10 amazing features Windows 8 and Windows Phone 8 need to share

2. Why the Tail-F acquisition is a big win for Cisco

3. Open Networking: The Whale that swallowed SDN

4. Microsoft trims Surface Pro 2 prices as sales of successor loom

5. Six ways to prevent a breach like the one at AT&T

6. "H4CKERS WANTED" report: NSA not having trouble filing cybersecurity jobs

7. Report: Neither iOS nor Android inherently more secure than the other

8. NetApp gets serious about all-flash shared storage with FAS8080 EX array

9. Telltale signs of ATM skimming

RESOURCE COMPLIMENTS OF: LeaseWeb

Enjoy full control of your own Private Cloud environment

Get into the driver's seat and create your own virtualized infrastructure on our Private Cloud. Dedicated cores for every instance. Available for a flat fee. Learn more

10 amazing features Windows 8 and Windows Phone 8 need to share

Building toward One Microsoft, all the timeAlthough Windows and Windows Phone now have more in common than ever, Microsoft still hasn't quite nailed the "one Microsoft" experience that it's been aiming for. Spend enough time with these two operating systems, and chances are you'll be longing for features that are available on one, but not the other.To read this article in full or to leave a comment, please click here READ MORE

Why the Tail-F acquisition is a big win for Cisco

This morning, Cisco announced its intention to purchase Sweden-based Tail-f Systems for about $175 million in cash and retention-based incentives. That seems reasonable for a software company that did about $30 million last year and is well aligned with the emerging SDN/NFV markets. Additionally, being headquartered in Sweden means Cisco can pay for this out of its foreign war chest instead of tapping into domestic cash.While Tail-f does have some enterprise relevance, it's really more of a service provider product. The company is well known for managing and orchestrating multi-vendor environments and has many service providers as customers, including AT&T and Deutsche Telekcom AG. Having AT&T as a customer is of particular interest given all the news around Domain 2.0 and Cisco being left out of the initial six. Now Cisco has a foot in the door of Domain 2.0.To read this article in full or to leave a comment, please click here READ MORE

Open Networking: The Whale that swallowed SDN

The year is 2011, the Open Networking Foundation has just been formed by the largest cloud and telecom service providers, software giants and academia – all of whom united at the inaugural Open Networking Summit under the common theme that the networking industry had fallen behind, its closed model stifled innovation and was not keeping up with the rest of the computer science discipline or the needs of emerging application and business requirements.As you can imagine, this message was not warmly received by all of the networking incumbents who were squarely implicated. As a result, many responded by indicating that these SDN cloud and software guys and academics didn't really understand networking, and that whatever technologies the incumbents already had were 'real SDN'. According to early incumbent rhetoric, OpenFlow was essentially a science project driven by idealists who didn't understand the real complexities of networking.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Network Instruments

3 Choices for Effective UC Management

This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More

Microsoft trims Surface Pro 2 prices as sales of successor loom

Discounts 2013's model by 10%-11% READ MORE

Six ways to prevent a breach like the one at AT&T

A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.AT&T reported last week that unauthorized employees of one of its service providers accessed the personal information of AT&T wireless customers. The exposed data included social security numbers and call records.[AT&T Mobility data breach]To read this article in full or to leave a comment, please click here READ MORE

"H4CKERS WANTED" report: NSA not having trouble filing cybersecurity jobs

While there's a notion that a dearth of cybersecurity professionals the shortage is most acute at the "high end" where $250,000 salaries are not uncommon for those who combine technical and managerial skills. That's according to the RAND Corp. report today on the topic, which also looked at how well the National Security Agency and other military-focused agencies were recruiting cybersecurity pros. The "H4CKERS WANTED" report from RAND, the non-profit policy think tank funded by the U.S. government and private endowment, looked at whether cybersecurity jobs are going unfilled, especially in the federal government, and if so, why. Co-authored by Martin Libicki, David Sentry and Julia Pollak, the RAND report reaches the conclusion that in the spectrum of the tasks that cybersecurity professionals might do, two types stand out as hard to find and recruit. In addition to the managerial job often thought of as the "chief information security officer" these days, it's also the talented geeky few who can figure out that highly stealthy attacks are occurring or who can find "the hidden vulnerabilities in software and systems that allow advanced persistent threats to take hold of targeted systems."To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Brocade Communications

IT Agility: How Do You Stack Up?

Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>>

Report: Neither iOS nor Android inherently more secure than the other

Apple's tight vetting of mobile applications gives it a security edge over Android, but there are still several ways for attackers to steal data from iOS devices, a mobile security company warned in a report Tuesday.The report looked at the risk factors facing users of the platforms, concluding that enterprises still face data breach risks regardless of the platform used."Neither iOS nor Android is inherently more secure than the other," according to Marble Security. "The risks to enterprises allowing employees to bring in their own devices, whether iOS or Android-based, are not that dissimilar."To read this article in full or to leave a comment, please click here READ MORE

NetApp gets serious about all-flash shared storage with FAS8080 EX array

Growing demand for flash continues to rock enterprise storage, with NetApp becoming the latest big vendor to shape a new product around the high-speed media.On Tuesday, NetApp introduced the FAS8080EX, a shared array that is optimized for use with pure flash. While all-flash arrays are still high-end items for enterprises and service providers with especially high performance requirements, flash is expected to make up a bigger part of data centers over time.NetApp boosted the power of its FAS series in February when it introduced the FAS8000. With Intel Ivy Bridge processors and increased memory, the 8000 series is now optimized for flash, though it had already been configurable for all flash, said Nathan Moffitt, director of storage platforms marketing.To read this article in full or to leave a comment, please click here READ MORE

Telltale signs of ATM skimming

ATM skimming schemes involve installing fraudulent equipment that criminals use to steal credit and debit card numbers and PINs. Industry estimates calculate that ATM fraud costs banks and consumers billions of dollars annually. Here are a few things to look for the next time you need to hit the ATM. READ MORE

WHITE PAPER: Kemp Technologies

Planning a Private Enterprise Cloud?

What you should know about SDN and Load Balancing/ADC's From Gartner & Kemp Technologies. Enterprises Planning Private Clouds should include Software Defined Networking with major network changes Learn More

SLIDESHOWS

10 reasons why open source is eating the world

Here are 10 reasons for the surging popularity of open source software.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How Google Glass set wearable computing back 10 years

2. 10 reasons why open source is eating the world

3. iPhone 6 rumor rollup for the week ending June 13

4. Need to move to IPv6 highlighted as Microsoft runs out of US address space

5. Chambers to retire this fall?

6. Leaked iPhone 6 photos emerge

7. Level 3 buying TW Telecom for $5.7 billion to upgrade metro coverage

8. Box just bought real-world equivalent of Pied Piper

9. What's the best approach to building next-generation data center networks?

10. Comcast's latest bad idea turns your Wi-Fi into everybody's Wi-Fi

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment