High-tech

High-tech
Light

Tuesday, October 14, 2014

A visual history of Netscape Navigator

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 14, 2014 9:01 PM
Subject: A visual history of Netscape Navigator
To: <aquarianm@gmail.com>
Cc:

  Microsoft patches 3 zero-days including Sandworm on Patch Tuesday | EMC to buy OpenStack cloud guru Cloudscaling

 
  Network World After Dark  

A visual history of Netscape Navigator
20 years after Netscape Navigator's debutThis week marks the 20th anniversary of the release of Netscape Navigator, the venerable web browser that unquestionably helped popularize the World Wide Web in an immeasurable way. Developed by Jim Clark and Marc Andreesen, Netscape Navigator was a revolutionary piece of software that fundamentally changed the way the masses used and accessed the Internet.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Kaminario

Testing of VMware View VDI on Kaminario K2 storage
This technical report covers detailed performance and efficiency tests for the Kaminario K2 array supporting VMware Horizon View virtual desktops that quantify its ability to support a range of critical VDI workloads. Learn More>>

WHITE PAPER: Dell | Symantec

Strategies for Gaining Control and Securing Mobility
We are in the midst of a mobile revolution. Numbers of mobile devices are growing with some experts predicting that employees will be carrying three or more devices. Growth is not limited to just devices. As the number of enterprise apps rapidly expands, "an app for everything" is a slogan few would question. Learn More

Microsoft patches 3 zero-days including Sandworm on Patch Tuesday
Ladies and gentlemen, for this National Cyber Security Awareness month, prepare yourself for a monster load of patches and restarts. Microsoft released nine Security Bulletins, but only eight security patches. Although there are five patches for remote code execution vulnerabilities, Microsoft rated only three of those as "Critical." Since RCE-flavored vulnerabilities can allow an attacker to take control and execute code on your PC, it seems like wisdom to patch all RCE bugs ASAP as if they were all rated Critical. Three of these RCE fixes are for zero-days being exploited in the wild.To read this article in full or to leave a comment, please click here Read More
 

EMC to buy OpenStack cloud guru Cloudscaling
An EMC spokesperson this afternoon confirmed that the company will buy Cloudscaling, which builds clouds based on the OpenStack software.The deal would mark the latest in a wave of consolidation in the cloud industry, with previous big acquisitions including HP snapping up Euclayptus and Cisco buying OpenStack vendor Metacloud. It also comes as there is some shakeup in the OpenStack community, with one of the forefathers of the movement, Joshua McKenty leaving his post as CTO of Piston Cloud Computing Co. and landing at Pivotal, the VMware/EMC spinout that is focused on the open source Cloud Foundry platform as a service. The move also comes just before the latest Juno release of the project and as the community gears up for its semi-annual summit to be held in Paris.To read this article in full or to leave a comment, please click here Read More
 

Dorothy Gale on recent spate of data breaches
The email pitch hits my inbox carrying this subject line: "Snapchat, and Kmart, and Chase…Oh My!"On the one hand, cringe-worthy.On the other hand, I had absolutely no trouble understanding the message that the public relations firm was trying to convey: These are scary times out there on the Yellow Brick Information Superhighway. (And then, by the way, I got to learn that the yellow brick road has its own Wikipedia page.)The movie was made in 1939 and, yes, there was a lot of publicity earlier this year surrounding its 75th anniversary, but I haven't even had to mention its name for the same reason that email subject line didn't need to be explained: We've all seen it, many of us many, many, many times.To read this article in full or to leave a comment, please click here Read More
 

Oracle database certifications aren't 'permanent' anymore
Oracle is requiring database administrators to upgrade their certifications if the ones they hold are for older versions of its platform."Earning an Oracle certification is a well-respected achievement," the company said on its website. "However, as products age and are removed from Oracle standard support maintenance, the technology becomes less relevant, devaluing the associated credential(s)."While that may seem like a reasonable enough conclusion, one question in a FAQ page on the site notes that "Oracle has stated that certification is permanent" and the policy change "seems to go against that."To read this article in full or to leave a comment, please click here Read More
 

How giant companies see the cloud
Cloud giantsImage by Chris KoehlerCIOs and cloud leaders at large enterprises -- Campbell Soup, Dow Chemical, GE, Nationwide, Western Union, Whirlpool and others -- talk about their successes and challenges as they deploy resources to public, private and hybrid cloud environments. Here's a snapshot of life in the cloud for each of these companies (organized alphabetically by company name).To read this article in full or to leave a comment, please click here Read More
 

What giant companies WON'T put in the cloud
In our interviews with CIOs at large enterprises, we found that adoption levels vary from simple experimentation to heavy use of cloud apps and infrastructure in public and private settings. Yet even among the most cloud-focused businesses, there are resources CIOs won't consider migrating to the cloud – at least not yet.Certain tactical capabilities can easily be acquired in the public cloud, but not everything falls into that category. Some enterprise systems aren't ready to be run in the public cloud because of safety and reliability concerns, says Joe Spagnoletti, CIO at Campbell Soup.[ ALSO ON NETWORK WORLD CIOs adopt down-to-earth cloud strategy ]To read this article in full or to leave a comment, please click here Read More
 

Google considers Amazon as its biggest search competitor
Google considers Amazon.com as its biggest search competitor, ahead of traditional rivals like Yahoo and Bing, as people looking to buy something are more likely to search on the online retailer's website. Amazon.com is more focused on commerce, "but, at their roots, they are answering users questions and searches, just as we are," Google Chairman Eric Schmidt told an audience in Berlin on Monday.ALSO ON NETWORK WORLD: Google Graveyard: Here's what Google has killed so far in 2014 Google is facing antitrust investigations in Europe since 2010, following complaints that it favored its own services in search results, affecting the visibility of competing websites. The company came to terms with the European Commission in February, but the commission has asked it to improve its settlement terms or face charges, following opposition to the deal.To read this article in full or to leave a comment, please click here Read More
 

7 free tools every network needs
In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster.Fortunately, many good tools, both commercial and open source, are available to shine much-needed light into your environment. Because good and free always beat good and costly, I've compiled a list of my favorite open source tools that prove their worth day in and day out in networks of any size. From network and server monitoring to trending, graphing, and even switch and router configuration backups, these utilities will see you through.To read this article in full or to leave a comment, please click here Read More
 

Researcher builds system to protect against malicious insiders
When an employee turns on his own company, the results -- damaged networks, data theft and even work stoppage -- could be devastating.It could rock the company even more than an outside attack because the insider knows where sensitive data is kept, what the passwords are and exactly how to hurt the company the most.MORE ON NETWORK WORLD: Free security tools you should try That's the driving force behind the work that Daphne Yao,To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

The Onion's 9 best bits about Microsoft

Poking fun at the software giant and founder Bill Gates since 1996.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. The Snappening: Snapsaved admits to hack that leaked SnapChat photos

2. This 60-year-old photo says a lot about diversity in technology

3. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode

4. Review: Surface Pro 3 isn't really what enterprises want in a laptop

5. Cisco advises users to lock down WebEx to prevent snooping

6. HP blade chassis is dense and intense

7. ChromeOS disses Linux users, drops ext2/3/4

8. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

9. Could ultra-cheap, clean energy be just around the corner? The return of Rossi and the E-Cat

10. Women in IT: No longer a nice-to-have


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment