High-tech

High-tech
Light

Monday, July 28, 2014

Layoffs cool Microsoft employees' opinion of CEO Satya Nadella

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 28, 2014 7:59 AM
Subject: Layoffs cool Microsoft employees' opinion of CEO Satya Nadella
To: <aquarianm@gmail.com>
Cc:

Are you a digital business bozo? Nine red flags that will drive customers away

LTE network for US public safety taking it one step at a time

Network World Daily News AM
July 28, 2014
Share this email

Layoffs cool Microsoft employees' opinion of CEO Satya Nadella

Percentage of former and current workers who approve of CEO drops by 24%, those who disapprove quadruples, after big layoffs hit

READ MORE
 

Issue highlights

1. Are you a digital business bozo? Nine red flags that will drive customers away

2. LTE network for US public safety taking it one step at a time

3. INSIDER How to Select IT Talent in a Merger (Free Reg)

4. Until the Tails privacy tool is patched, here's how to stay safe

5. Facebook posts can land Americans on watchlists

6. "The finest computers money can buy"

7. WeatherFlow Wind Meter, low cost, accurate wind speed measurement

8. SEC drops probe into Facebook's pre-IPO sales disclosures

9. Oracle's new in-memory database option could spark unanticipated costs, expert warns

10. The hidden dangers of "good enough" authentication

 

Are you a digital business bozo? Nine red flags that will drive customers away

Building a small business is hard enough, but it is all the harder today because you have to hit the ground running with an online presence that works. Given that most businesses aren't tech-oriented and have hardly any digital literacy, they're in danger of being out-marketed by the few businesses that do have a digital clue. If you're in the former category you are; forgive me; a digital business bozo and, unless you get clued in really fast, you could pay the ultimate business price: Going broke. Here are 9 red flags that say "Digital business bozo ahead, spend your money elsewhere."To read this article in full or to leave a comment, please click here READ MORE

LTE network for US public safety taking it one step at a time

The organizers of the FirstNet LTE public safety network have the frequencies and standards they need to build the system, and they know where the money's coming from. They know how to get there from here, but it won't be a quick trip.FirstNet will realize a vision that emerged in the wake of the 9/11 terror attacks, using technology that didn't exist until years later. It will be a single network linking all federal, state and local public-safety agencies in the U.S., based on the same radio spectrum and technology throughout. Though it won't replace every public-safety radio system in use today, FirstNet will help to eliminate the crazy quilt of incompatible radio systems and frequencies that makes it hard for different teams to coordinate their efforts.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

How to Select IT Talent in a Merger (Free Reg)

In today's dog-merge-dog world, one of the greatest challenges is determining how to weave the IT talent from merging companies into one successful, thriving organization. Divestitures pose the same challenge: deciding who will stay and who will go.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

WHITE PAPER: Netskope

Cloud Control: 10 Must-Haves for Enacting a Cloud App Policy

If you're responsible for ensuring proper usage of cloud apps in your company, shoring up your IT policies is likely on your to-do list. This cloud app policy checklist is the top 10 prerequisites gathered from real IT professionals and each includes a "next step" to help make each tip actionable. Learn more!

Until the Tails privacy tool is patched, here's how to stay safe

Patches are ready for IP2, the vulnerable component in Tails, but it's not clear when Tails will update READ MORE

Facebook posts can land Americans on watchlists

As we've seen in the past, there's nothing reasonable about supposedly suspicious activities as numerous you-might-be-a-terrorist-if lists are often filled with harmless behaviors. You know there are "hot" keywords monitored by government agencies and that anything you might say on social media could come back and bite you at a later date; those facts were again highlighted in the 166-page document issued by the National Counterterrorism Center to give "watchlisting guidance."To read this article in full or to leave a comment, please click here READ MORE

"The finest computers money can buy"

Get ready for another throwback TV series: WGN America next month debuts "Manhattan", the story of the atomic bomb project during World World II. In this scene from the show, which launches on Sunday, July 27, we're introduced to the whiz-bang computers of the day... RELATED: New movie "The Imitation Game" puts spotlight on Alan Turing and the Enigma code during World War IITo read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

IT Friction and Your Organization

This report outlines key issues that cause friction between business users and IT. Learn More

WeatherFlow Wind Meter, low cost, accurate wind speed measurement

There are many situations in which it's necessary to have a good idea of how the wind is behaving. For example, if you're going sailing you'll probably want to verify the forecast and, rather more importantly, if you're a firefighter dealing with wildfires, you'll definitely want to know whether the wind is working for or against you; from Introduction to Wildland Fire Behavior: Wind is the most critical weather element affecting wildland fire behavior, the most difficult to predict, and the most variable in both time and location. / This variability (especially in rough terrain) can pose safety and fire control problems, which can result in firefighter fatalities. Wind direction and wind speed must be constantly monitored by all firefighters.To read this article in full or to leave a comment, please click here READ MORE

SEC drops probe into Facebook's pre-IPO sales disclosures

The U.S. Securities and Exchange Commission has dropped its investigation into disclosures about Facebook advertising sales before the company went public in 2012.Facebook said Thursday in an SEC filing that it was notified by the agency in May that the inquiry had been terminated and no enforcement action was recommended.The SEC launched its investigation over claims that Facebook shared lowered advertising-sales projections immediately before its initial public offering with some analysts, who then shared that information with a select group of investors without disclosing it to the wider public.To read this article in full or to leave a comment, please click here READ MORE

Oracle's new in-memory database option could spark unanticipated costs, expert warns

Oracle database shops that have or are planning to download the latest version of 12c take warning: The vendor's newly launched, much-hyped in-memory processing database option is turned on by default, according to one expert.The in-memory option costs US$23,000 per processor, according to an Oracle price list updated this week. Customers who don't realize the option has been switched on may find their next license audit "um, more entertaining," wrote Kevin Closson, a senior director in EMC's performance engineering group and a former Oracle architect who worked on its Exadata database machine, in a post on his personal blog this week.To read this article in full or to leave a comment, please click here READ MORE

The hidden dangers of "good enough" authentication

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. While it's human nature to make comparisons, not all comparisons are helpful or accurate. When comparing a Porsche and a Volkswagen, for example, the most you can say is that they are both vehicles. They have wheels and doors and engines, and will get you from Point A to Point B, but that is where the comparison ends.In a similar vein, not all multi-factor authentication approaches are the same. The variances can mean the difference between true security and susceptibility to phishing, between timeliness and late arrival of authentication codes, and between user-friendly and hard-to-use applications.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats

Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment