High-tech

High-tech
Light

Friday, August 15, 2014

Tech execs rise to ALS Ice Bucket Challenge

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 14, 2014 9:01 PM
Subject: Tech execs rise to ALS Ice Bucket Challenge
To: <aquarianm@gmail.com>
Cc:

  2014's Hottest IT Certification | 5 Big Data projects that could change your life

 
  Network World After Dark

Forward this to a Friend >>>


Tech execs rise to ALS Ice Bucket Challenge
It was only a matter of time before high tech execs got in on the ice bucket challenge for ALS awareness that has been sweeping across Facebook, Twitter and other social networks in recent weeks. Phil Schiller, Apple's SVP of marketing, has showered himself in freezing water and via Twitter, has challenged CEO Tim Cook to do likewise, and Facebook CEO Mark Zuckerberg has challenged Bill Gates and others. Read More
 


WEBCAST: IBM

Charting Your Analytical Future
Date: August 26, 2014, 11:00 AM EDT The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. Register Now>>

WHITE PAPER: BMC Software
 
Prioritize Capacity Planning with BMC Capacity Optimization
Current trends underscore the requirement for truly global and adaptable capability for optimizing capacity across domains with full insight into business service outcomes. Learn why EMA has put BMC in the lead as the vendor with the fullest breadth and depth of its capacity optimization capabilities. Learn More

2014's Hottest IT Certification
In the world of technology, the certifications and skills that organizations need to keep pace is constantly shifting. To help you find the most valuable certifications to advance your tech career, CIO.com spoke with David Foote, Chief Analyst and Research Officer with Foote Partners, to find out what certifications are on fire in today's IT market. Read More
 

 

INSIDER
5 Big Data projects that could change your life
Most over-hyped technology trends wear out their welcome pretty quickly, which should make skeptics among us wary about Big Data. However, while Big Data is being touted as the latest trend that will change the world, the skeptics aren't as, well, skeptical as they were about cloud and social.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

Schneier: Cyber-retaliation like that exposed by Snowden report a bad idea
The NSA program dubbed MonsterMind is dangerous in that it would enable automated retaliation against machines that launch cyber attacks with no human intervention, meaning that such counterattacks could hit innocent parties.MonsterMind came to light through a Wired magazine interview with former NSA sysadmin Edward Snowden, who stole and publicly released thousands of NSA documents.+[Also on Network World: Snowden reveals automated NSA cyberwarfare program; 10 disturbing attacks at Black Hat USA 2014]+To read this article in full or to leave a comment, please click here Read More
 

Installing Ubuntu on an old netbook with hair tearing and profanity
After a few extremely frustrating hours trying to install Ubuntu 14.04.1 LTS, the latest version of the Ubuntu operating system for desktop PCs and laptops, on an older netbook style laptop (one with only USB ports) I finally succeeded.There was one crucial piece of information missing which, if I'd had it, would have made the whole process take perhaps half an hour. But I didn't have that piece of information  and, as a result, there was a lot of tearing out of hair and profane utterances …Old Hardware First of all, the machine I was installing on was a Sony VPCM121AX which has an Intel Atom N470 Processor, a measly 1GB of RAM, a 250GB drive, 10Base-T/100Base-TX Ethernet, 802.11 b/g/n Wi-Fi, and Bluetooth v3. It came with Windows 7 Starter Edition (32-Bit) which, given its processor, meant that it ran on the ragged edge of exhaustion for most tasks so Ubuntu was a highly desirable alternative.To read this article in full or to leave a comment, please click here Read More
 

Survey: Most hackers do it for the lulz
  What motivates hackers to wreak havoc on security systems and steal sensitive data? According to a new survey, most hackers do it for kicks, and few think they'll get caught. Security firm Thycotic surveyed 127 self-identified hackers at the Black Hat conference last week. When asked about their motivations, 51 percent said they hacked mainly for the thrill of it. By comparison, 29 percent said they were motivated by some social or moral issue—presumably related to the target—and 19 percent said they were mainly seeking financial gain. Only 1 percent said they were primarily looking for notoriety.To read this article in full or to leave a comment, please click here Read More
 

Google broadens its malware sleuthing to sniff out deceptive downloads
Google is expanding its safe browsing technology to notify Web users of downloads that appear benign, but actually make unwanted changes to their computers.Starting next week, the company's safe browsing service will identify more types of deceptive software on the Web, Google said Thursday. The company is homing in on programs that claim to be helpful downloads, but end up making unexpected changes to a computer like switching the homepage or other browser settings, Google said.To read this article in full or to leave a comment, please click here Read More
 

6 Apple 'geniuses' allegedly stole 600 iPhones
Six Apple  store employees in Florida are facing charges over an alleged scheme that would see them replace more than 600 stolen iPhones with new devices taken from store inventory.The Fort Lauderdale Sun Sentinel reports: How did the scheme work? Since April, thieves who posed as customers at the store handed stolen iPhones to employees in the ring and exchanged them for new iPhones, police said. Each Apple employee in the ring was paid between $45 and $75 for carrying out a fraudulent transaction, police said.To read this article in full or to leave a comment, please click here Read More
 

Cisco slashing up to 6,000 jobs
Cisco Systems will cut as many as 6,000 jobs over the next 12 months, saying it needs to shift resources to growing businesses such as cloud, software and security.The move will be a reorganization rather than a net reduction, the company said. It needs to cut jobs because the product categories where it sees the strongest growth, such as security, require special skills, so it needs to make room for workers in those areas, it said."If we don't have the courage to change, if we don't lead the change, we will be left behind," Chairman and CEO John Chambers said on a conference call.Cisco has about 74,000 employees, so the cuts will affect about 8 percent of its staff. It will take charges of about US$700 million for the cost of the reorganization, up to half of that in the current quarter, Chief Financial Officer Frank Calderoni said.To read this article in full or to leave a comment, please click here Read More
 

5 veteran CIOs take stock of the changing tech sector
Long-timers reflect on all that's evolved since they first assumed the CIO role at their companies. Read More
 

 

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment