High-tech

High-tech
Light

Sunday, September 14, 2014

The curious histories of 10 common computer messages

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Sep 14, 2014 7:01 AM
Subject: The curious histories of 10 common computer messages
To: <aquarianm@gmail.com>
Cc:

HP buys Eucalyptus: What it means for the hybrid cloud

Will NSX snub hurt Cisco's integrated infrastructures?

Network World Daily News AM
September 14, 2014

The curious histories of 10 common computer messages

"Image by flickr/Ed SummersRecently we learned that former Microsoft CEO Steve Ballmer was the author of one of Windows' more notorious blue screen messages. It's one of a number of messages that our computers communicate to us so often that they earn permanent spots in our collective consciousness. These include error messages as well as informational notes and are often in words but can also be communicated in other ways, such as through graphics or sounds.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. HP buys Eucalyptus: What it means for the hybrid cloud

2. Will NSX snub hurt Cisco's integrated infrastructures?

3. New survey raises questions about net neutrality regulation, advocacy group says

4. SDN market could hit $18B by 2018

5. Funny thing about the iPhone 6 and Apple Watch...

6. How to Tell If the iPhone 6 or iPhone 6 Plus Is Right For You

7. Enterprise Annexation of Endpoint Security

8. How Google's tiff with certificate authorities can impact you

9. 5 questions to ask before you take a tech job

10. INSIDER Review: New Gigabit Wi-Fi options for enterprise, SMB, SOHO

11. Get More Network World Newsletters!

WHITE PAPER: Ixia

Overcoming Visibility Deficits in Virtualized Environments

With up to 80% of data center traffic traveling between virtualized servers, end-to-end visibility is a major concern. This paper provides an overview of virtualized data center blind spots and offers a solution to overcome them. View now

HP buys Eucalyptus: What it means for the hybrid cloud

HP bought open source private cloud company Eucalyptus for a reported about $100 million in a move that could have dramatic implications for HP's status in the IaaS market.Eucalyptus makes private cloud management software - basically customers can use it to build a private cloud. The company's focus has been on creating a platform that is closely integrated with Amazon Web Service's public cloud. The thinking by Eucalyptus execs was that Eucalyptus would win by being the private cloud for the most popular public cloud.+ MORE CLOUD NEWS: CloudBees pivots from PaaS to Jenkins +To read this article in full or to leave a comment, please click here READ MORE

Will NSX snub hurt Cisco's integrated infrastructures?

Did Cisco and NetApp shoot themselves in the foot by rejecting VMware's NSX on FlexPod? This Seeking Alpha post, by investment researcher Critical Timing, implies that they did by ceding roughly one-third of the SDN market. By refusing to support NSX…Cisco and NetApp appear to be willing to risk losing a sizable share of the SDN market. Cisco and NetApp said back in June that they would not support NSX on FlexPod reference IT architectures combining Cisco compute and networking, and NetApp storage. That followed a statement from VCE in May, the coalition of Cisco and EMC building integrated and converged IT infrastructures, that it would not support NSX on its Vblock systems even though VMware invests in VCE and its hypervisors are integral to Vblocks.To read this article in full or to leave a comment, please click here READ MORE

New survey raises questions about net neutrality regulation, advocacy group says

CALinnovates calls on the FCC to stay away from reclassifying broadband as a public utility READ MORE

: Riverbed | Orange

A CIO's Guide to Better Network Performance

IT consolidation is putting significant strains on the traditional network paradigm. The videos in this Knowledge Vault provide executive overviews of how to meet branch consolidation goals with an eye to a seamless hybrid networking architecture that is application-aware, simple to manage, and leverages application visibility and WAN optimization. Learn More

SDN market could hit $18B by 2018

The enterprise and data center SDN market grew 192% in 2013 and is poised to reach $18 billion by 2018, according to Infonetics Research.The firm's data tracks SDN controllers and Ethernet switches in-use as well as SDN-capable Ethernet switches. The "real" market for SDN - in-use SDN Ethernet switches and controllers – will reach $9.5 billion in 2018, Infonetics predicts.+MORE ON NETWORK WORLD: 11 tips to prepare for SDN+To read this article in full or to leave a comment, please click here READ MORE

Funny thing about the iPhone 6 and Apple Watch...

Youtube starts to fill up with humorous takes on the big Apple iPhone 6, Apple Watch news READ MORE

How to Tell If the iPhone 6 or iPhone 6 Plus Is Right For You

On Tuesday, Apple unveiled the latest additions to its iPhone family, the iPhone 6 and iPhone 6 Plus. They're the largest iPhones ever, and according to Apple, they're "better in every way" than its last generation of smartphones. Both of these high-end devices are very similar, but there are five notable differences between them that potential iPhone 6 buyers should consider before making a purchase.MORE ON NETWORK WORLD: iPhoneys: Apple iPhone 6 concepts 1) iPhone 6 v. iPhone 6 Plus: Size and WeightTo read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: IBM

Quintillion Case Study

Hedge fund administration company Quintillion doubles its asset and investor portfolio while keeping staff levels almost flat, by working with Insight 2 Value to deploy an efficient content management solution, based on IBM Case Manager. Read Now

Enterprise Annexation of Endpoint Security

When it comes to strong cybersecurity endpoints and servers have often been second-class citizens when compared to the network.  I described this situation in a March 2013 blog.  According to ESG research, 58% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) said that network security processes, skills, and technical controls were "much more thorough" or "somewhat more thorough" than server security processes, skills, and technical controls. Why the discrepancy?  Network security includes mature technologies like firewalls, IDS/IPS, and Web Application Firewalls (WAFs).  Furthermore, network security often involves a lot of network design and engineering for segmentation, access control, and traffic management.  Alternatively, endpoint and server security is typically based on nothing more than AV software and its associated signature downloads and occasional scans.To read this article in full or to leave a comment, please click here READ MORE

How Google's tiff with certificate authorities can impact you

Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome.The CAs are upset over Google's roughly six-month timetable for ratcheting up the notices that begin this month for Chrome users visiting sites that do not upgrade from SHA-1 to SHA-2.SHA, which stands for "secure hash algorithm," is used in scrambling data moving on a secured connection between a browser and a web server. Browsers typically display an HTTPS in the URL when such a connection exists.MORE ON NETWORK WORLD: Free security tools you should try Most websites use a SHA-1-based signature as part of their certificate chain. The hash algorithm has well-known security weaknesses that go away with SHA-2.To read this article in full or to leave a comment, please click here READ MORE

5 questions to ask before you take a tech job

IT positions don't always match up to their interview hype. Ask these questions to ensure you know what you're getting into before saying "yes" to your next job offer. READ MORE

INSIDER

Review: New Gigabit Wi-Fi options for enterprise, SMB, SOHO

Meru hits enterprise sweet spot, EnGenius and ZyXEL target SMBs with 802.11ac access points. READ MORE

Get More Network World Newsletters!

We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE

WHITE PAPER: Fortinet

Security Concerns in the C-Suite

Next-generation firewall technology (NGFW) addresses the most prevalent security issues. Fortinet's FortiGate NGFW integrates five crucial security protections, including strong authentication, antimalware and APT detection. View Now>>

SLIDESHOWS

7 sexy smartphone technologies coming your way

A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 to users: I'm listening

2. Five million Gmail addresses and passwords dumped online

3. Internet of Overwhelming Things

4. What online news looked like on 9/11

5. Man arrested on drug charges after butt-dialing 911

6. The Linux desktop-a-week review: ratpoison

7. iPhone 6, Apple Watch features: Android's been there, done that

8. 5 questions to ask before you take a tech job

9. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more

10. First Look: iPhone 6 and iPhone 6 Plus

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment