High-tech

High-tech
Light

Thursday, August 28, 2014

Hot products at VMworld 2014

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 28, 2014 9:01 PM
Subject: Hot products at VMworld 2014
To: <aquarianm@gmail.com>
Cc:

  Red Hat CTO abruptly resigns | What Apple can do to improve the iPhone 6 display

 
  Network World After Dark  

Hot products at VMworld 2014
Click through all the products being released at VMworld this week Read More
 


WEBCAST: IBM

ING Transforms DevOps to Reduce Cost and Speed Delivery
ING, one of the largest banks in Europe needed to reduce the high cost of isolated, inefficient application development. They chose IBM PureApplication System to move their IT infrastructure to a cloud-based shared service model. In this Webcast, ING executive, Mark Willemse, shares the lessons ING learned from this strategic initiative. Learn more

WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

Red Hat CTO abruptly resigns
CTO Brian Stevens is out at Red Hat, according to a curt press release issued by the company Wednesday evening. Read More
 

What Apple can do to improve the iPhone 6 display
For over a year, the main obsession about the upcoming 2014 iPhone models (i.e. iPhone 6) has been the size and resolution of the screen. But Apple faces other challenges for its mobile touchscreens, and how, or whether, it deals with those may have a bigger impact on the user experience than simply a bigger screen. Read More
 

Router malware: Fact or fiction?
Malware affecting a computer's operation is not always found in the computer itself. Just recently we encountered a common operational issue on several computers in our home network. Various browsers on different computers running different operating systems were intermittently redirecting webpages. The issue manifests itself by redirecting webpages to an unfamiliar merchant site.[Home routers: Broken windows to the world]The confluence of characteristics of the particular malware, cache history of a user, settings on a particular computer, and how the aberrant browser behavior manifests itself can result in the troubleshooting effort becoming a head-scratcher. Issues relating to webpage redirection are likely attributed to a spurious domain name services (DNS) server.To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
IT Resume Makeover: How to Avoid Buzzword Burnout
Christopher White's resume was crammed with buzzwords, jargon and what executive resume writer, social media and career strategist Donald Burns calls "techno-gibberish."To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

The Linux Desktop-a-week Review: elementary OS's Pantheon
My ongoing quest to live in every Linux Desktop Environment – for one week at a time – has brought me to a relative newcomer -- the elementary OS project's "Pantheon" environment.Read the journey so far: Enlightenment, Awesome, MATE, KDE Plasma, Ubuntu's Unity Last week, I was pretty hard on Unity. Specifically, I knocked Unity's lack of customizability and the fact that you can really only use Unity when running Ubuntu (and, even then, if you want the latest version of the Unity desktop, you need the latest version of Ubuntu itself... which is rather annoying).To read this article in full or to leave a comment, please click here Read More
 

Apple confirms September 9 media event
Apple Thursday mailed formal invitations to a media event on September 9, to be held at the Flint Center, in Cupertino at 10 a.m. Pacific time. The company is widely expected to announce the next iPhone, presumably the iPhone 6, in two models with two different screen sizes Read More
 

White House Cybersecurity Coordinator Is Kind of Right – but Mostly Wrong
  Poor Michael Daniel, the White House cybersecurity coordinator and the man who "leads the interagency development of national cybersecurity strategy and policy" is taking a beating in the press.  In a recent interview with federally-focused media outlet, GovInfoSecurity, Daniel defended his lack of security technology experience with the following statement:  "You don't have to be a coder in order to really do well in this position.  In fact, actually, I think being too down in the weeds at the technical level could actually be a little bit of a distraction.  You can get taken up and enamored with the very detailed aspects of some of the technical solutions and the real issue is looking at the broad strategic picture."To read this article in full or to leave a comment, please click here Read More
 

Key factors to consider when evaluating video conferencing
Simplicity, reliability, scalability and security are core considerations, but when it comes to questions about cost, take into account what you'll miss if you decide not to deploy. Read More
 

The worst cloud outages of 2014 (so far)
Which companies have failed the worst when it comes to cloud outages in 2014? Time for the list no one wants to land on Read More
 

 

SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Toss routers with hardcoded passwords, expert says

2. One frustrating Linux problem that Windows, Mac users don't deal with

3. Netflix open sources internal threat monitoring tools

4. Internet of Overwhelming Things

5. US warns 'significant number' of major businesses hit by Backoff malware

6. 15 simple, secret Windows tips and tricks designed to save you time

7. Juniper CEO on IoT, co-creation and the IOP

8. The 10 best laptops of 2014 (so far)

9. 11 Internet of Things ideas worth watching

10. How Google Fiber is disrupting the broadband deployment model


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment