| Tech execs rise to ALS Ice Bucket Challenge It was only a matter of time before high tech execs got in on the ice bucket challenge for ALS awareness that has been sweeping across Facebook, Twitter and other social networks in recent weeks. Phil Schiller, Apple's SVP of marketing, has showered himself in freezing water and via Twitter, has challenged CEO Tim Cook to do likewise, and Facebook CEO Mark Zuckerberg has challenged Bill Gates and others. Read More WEBCAST: IBM
Charting Your Analytical Future Date: August 26, 2014, 11:00 AM EDT The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. Register Now>> WHITE PAPER: BMC Software Prioritize Capacity Planning with BMC Capacity Optimization Current trends underscore the requirement for truly global and adaptable capability for optimizing capacity across domains with full insight into business service outcomes. Learn why EMA has put BMC in the lead as the vendor with the fullest breadth and depth of its capacity optimization capabilities. Learn More 2014's Hottest IT Certification In the world of technology, the certifications and skills that organizations need to keep pace is constantly shifting. To help you find the most valuable certifications to advance your tech career, CIO.com spoke with David Foote, Chief Analyst and Research Officer with Foote Partners, to find out what certifications are on fire in today's IT market. Read More 5 Big Data projects that could change your life Most over-hyped technology trends wear out their welcome pretty quickly, which should make skeptics among us wary about Big Data. However, while Big Data is being touted as the latest trend that will change the world, the skeptics aren't as, well, skeptical as they were about cloud and social.To read this article in full or to leave a comment, please click here(Insider Story) Read More Schneier: Cyber-retaliation like that exposed by Snowden report a bad idea The NSA program dubbed MonsterMind is dangerous in that it would enable automated retaliation against machines that launch cyber attacks with no human intervention, meaning that such counterattacks could hit innocent parties.MonsterMind came to light through a Wired magazine interview with former NSA sysadmin Edward Snowden, who stole and publicly released thousands of NSA documents.+[Also on Network World: Snowden reveals automated NSA cyberwarfare program; 10 disturbing attacks at Black Hat USA 2014]+To read this article in full or to leave a comment, please click here Read More Installing Ubuntu on an old netbook with hair tearing and profanity After a few extremely frustrating hours trying to install Ubuntu 14.04.1 LTS, the latest version of the Ubuntu operating system for desktop PCs and laptops, on an older netbook style laptop (one with only USB ports) I finally succeeded.There was one crucial piece of information missing which, if I'd had it, would have made the whole process take perhaps half an hour. But I didn't have that piece of information and, as a result, there was a lot of tearing out of hair and profane utterances …Old Hardware First of all, the machine I was installing on was a Sony VPCM121AX which has an Intel Atom N470 Processor, a measly 1GB of RAM, a 250GB drive, 10Base-T/100Base-TX Ethernet, 802.11 b/g/n Wi-Fi, and Bluetooth v3. It came with Windows 7 Starter Edition (32-Bit) which, given its processor, meant that it ran on the ragged edge of exhaustion for most tasks so Ubuntu was a highly desirable alternative.To read this article in full or to leave a comment, please click here Read More Survey: Most hackers do it for the lulz What motivates hackers to wreak havoc on security systems and steal sensitive data? According to a new survey, most hackers do it for kicks, and few think they'll get caught. Security firm Thycotic surveyed 127 self-identified hackers at the Black Hat conference last week. When asked about their motivations, 51 percent said they hacked mainly for the thrill of it. By comparison, 29 percent said they were motivated by some social or moral issue—presumably related to the target—and 19 percent said they were mainly seeking financial gain. Only 1 percent said they were primarily looking for notoriety.To read this article in full or to leave a comment, please click here Read More Google broadens its malware sleuthing to sniff out deceptive downloads Google is expanding its safe browsing technology to notify Web users of downloads that appear benign, but actually make unwanted changes to their computers.Starting next week, the company's safe browsing service will identify more types of deceptive software on the Web, Google said Thursday. The company is homing in on programs that claim to be helpful downloads, but end up making unexpected changes to a computer like switching the homepage or other browser settings, Google said.To read this article in full or to leave a comment, please click here Read More 6 Apple 'geniuses' allegedly stole 600 iPhones Six Apple store employees in Florida are facing charges over an alleged scheme that would see them replace more than 600 stolen iPhones with new devices taken from store inventory.The Fort Lauderdale Sun Sentinel reports: How did the scheme work? Since April, thieves who posed as customers at the store handed stolen iPhones to employees in the ring and exchanged them for new iPhones, police said. Each Apple employee in the ring was paid between $45 and $75 for carrying out a fraudulent transaction, police said.To read this article in full or to leave a comment, please click here Read More Cisco slashing up to 6,000 jobs Cisco Systems will cut as many as 6,000 jobs over the next 12 months, saying it needs to shift resources to growing businesses such as cloud, software and security.The move will be a reorganization rather than a net reduction, the company said. It needs to cut jobs because the product categories where it sees the strongest growth, such as security, require special skills, so it needs to make room for workers in those areas, it said."If we don't have the courage to change, if we don't lead the change, we will be left behind," Chairman and CEO John Chambers said on a conference call.Cisco has about 74,000 employees, so the cuts will affect about 8 percent of its staff. It will take charges of about US$700 million for the cost of the reorganization, up to half of that in the current quarter, Chief Financial Officer Frank Calderoni said.To read this article in full or to leave a comment, please click here Read More 5 veteran CIOs take stock of the changing tech sector Long-timers reflect on all that's evolved since they first assumed the CIO role at their companies. Read More | |
| SLIDESHOWS Black Hat 2014: How to crack just about everything From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES of 2014 1. Netscout sues Gartner over Magic Quadrant rating 2. Why TCP/IP is on the way out 3. Amazon Fire Phone: Nice but nothing to get fired up about 4. Rackspace bows out commodity IaaS market in favor of 'managed cloud' 5. Cisco's new UCS fabric interconnect: no ACI? 6. Smartphone kill-switch bill passes California assembly 7. Emerging networking technology used by Apple, Cisco will frustrate firewalls 8. IBM/DARPA turn out brain-like 5-billion transistor superchip 9. 10 ways to get noticed at Black Hat 10. Top 20 colleges for computer science majors, based on earning potential JOIN THE IDG CONTRIBUTOR NETWORK The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark. Apply now to become a member |
No comments:
Post a Comment