High-tech

High-tech
Light

Friday, October 17, 2014

Cisco exec: Turnover in engineering no problem

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 17, 2014 2:27 PM
Subject: Cisco exec: Turnover in engineering no problem
To: <aquarianm@gmail.com>
Cc:

Best Tech-o-Lanterns 2014

Namifying has gotten out of controlify

Network World Daily News PM
October 17, 2014

Cisco exec: Turnover in engineering no problem

The engineering reorganization currently underway at Cisco is intended to streamline product development and delivery to customers, Cisco says. That it is prompting some high profile departures is an expected byproduct of any realignment of this size, which affects 25,000 employees, says Cisco Executive Vice President and Chief Development Officer Pankaj Patel, who is conducting the transformation.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Best Tech-o-Lanterns 2014

2. Namifying has gotten out of controlify

3. HP unveils cloud config manager

4. Envious of fiber broadband? Help is on the way for copper users

5. Apple's new iMac Retina is worth the cost for your employees

6. Six browser plug-ins that protect your privacy

7. ITworld cartoons 2014: The year in geek humor (so far)

8. First Look: The iPad Mini 3, iPad Air 2 and more

9. New technique allows attackers to hide stealthy Android malware in images

WHITE PAPER: Curvature

The State of IT Infrastructure & Operations

The challenge that IT decision-makers face is the pressure to reduce costs paired with the pressure to progress digital maturity. Curvature analyzes why businesses miss significant CapEx and OpEx cost savings and how to refocus IT strategy. View now

Best Tech-o-Lanterns 2014

Techie pumpkinsLeave it to techies to show off their passions on their pumpkins, whether it's paying homage to tech innovators, products or companies. Enjoy!Trust your neighbors?Image by YouTube.comTo read this article in full or to leave a comment, please click here READ MORE

Namifying has gotten out of controlify

Chris Johnson, a Seattle-based branding consultant operating as The Name Inspector, has been watching a company name trend for several years now that is likely attributable to the success of Spotify: slapping "ify" on the end of otherwise perfectly good words.  Dating back to 2007, Johnson has counted some 337 such company names; 101 last year and 73 so far this year. The chart he fashioned is a bit big to be legible here, so let's just list this year's batch of namified names (prepare for some scrolling):To read this article in full or to leave a comment, please click here READ MORE

HP unveils cloud config manager

HP this week unveiled a network virtualization system for large enterprise and cloud providers designed to simplify network configuration.Called Distributed Cloud Networking (DCN), HP says the product allows service providers and large organizations to deploy secure cloud networks across a distributed infrastructure in minutes instead of months. DCN is also intended to optimize network resources and speed time-to-market, HP says, through centralized control and automated management of private, public or hybrid data centers.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Dell Software

The Top 10 Things DBAs Should Know About Toad for IBM DB2

Toad for IBM DB2 is a powerful tool for the database administrator. But it's some of its newer and lesser known features that provide the great productivity benefits in the DBA's day-to-day work. Do you know the top 10 features of Toad for IBM DB2? Download this white paper and find out. View now

Envious of fiber broadband? Help is on the way for copper users

A technology that delivers broadband speeds over copper lines at a speed comparable to fiber is gaining momentum.Telekom Austria said this week it had connected the first subscriber in the world to its domestic network with G.fast, which offers data rates of up to several 100 Mbit/s via existing copper lines. That will meet the needs of even the most demanding households over the next 10 to 20 years, according to the operator.G.fast increases the bandwidth by using more spectrum. That places extra demands on equipment to be very good at handling interference, a far from trivial requirement.G.fast only works over short distances, up to 250 meters, so it is only used to connect subscribers to the nearest distribution point; the rest of the network must be fiber. That means it can't replace all slow DSL lines, but it will be used where it's difficult or too expensive for operators to install fiber all the way to the subscriber's modem.To read this article in full or to leave a comment, please click here READ MORE

Apple's new iMac Retina is worth the cost for your employees

The reasoning is simple: Technology that makes people more productive is almost always a good investment. READ MORE

Six browser plug-ins that protect your privacy

It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, something has to pay for all the free programming and services. Of course, there are ways that users can quell the seemingly endless stream of buttons, banners, video interstitials and more. All you need is an ad blocker: a browser plug-in designed to filter out those unwanted distractions and interruptions. For many users, though, there's another concern that is more important than simple annoyance: privacy. Some sites do more than just plaster their content with digital billboards. They log your visits (usually via IP addresses) and even track your movements to other destinations. Although the driving motivator is usually just broad-based data-gathering, it can be unsettling to realize you're being followed online.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: AT&T

Network-Enabled Cloud: Key Considerations

A network-enabled cloud combines the control, protection, and performance advantages of a private cloud with the economies and elasticity of a public cloud, and seamlessly integrates corporate VPNs with cloud-based resources. Learn more about key Considerations and Partner Selection Criteria in this IDC whitepaper. Learn More

ITworld cartoons 2014: The year in geek humor (so far)

October 17th - It was love at first authentication Image by ITworld/Phil JohnsonThere was a time, not that long ago, when almost all of the texts I received were from family or friends. Nowadays, though, it seems like I get far more texts from authentication services, sending me codes so I can verify to some web site or app that I am whom I claim to be. In the wake of yet more online data breaches (or alleged ones), I just keep enabling two-factor authentication in more and more places. Where will this sort of thing end? I don't know, but I'm just glad I'm already married.To read this article in full or to leave a comment, please click here READ MORE

First Look: The iPad Mini 3, iPad Air 2 and more

Apple's glossy new tablets were accompanied by new iMacs and OS X Yosemite. READ MORE

New technique allows attackers to hide stealthy Android malware in images

A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.The attack was developed by Axelle Apvrille, a researcher at Fortinet, and reverse engineer Ange Albertini, who presented their proof-of-concept at the Black Hat Europe security conference in Amsterdam Thursday.It's based on a technique devised by Albertini dubbed AngeCryption that allows controlling both the input and the output of a file encryption operation using the Advanced Encryption Standard (AES) by taking advantage of the properties of some file formats that allow files to remain valid despite having junk data appended to them.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: HP

Infographic: The IT Service Broker

Get on the path to consumer-inspired IT service delivery with an HP IT service catalog, portal, and service exchange. Learn More

SLIDESHOWS

The Onion's 9 best bits about Microsoft

Poking fun at the software giant and founder Bill Gates since 1996.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Moto X 2nd Gen review: Same same but different

2. Apple's iPad 2 vs. Google's Nexus 9: Comparing the two new tablets

3. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode

4. First Look: The iPad Mini 3, iPad Air 2 and more

5. 12 things I hate about Hadoop

6. The Snappening: Snapsaved admits to hack that leaked SnapChat photos

7. A tale of Ransomware that will make your blood run cold ...

8. Apple's most important iPad, iMac, OS X Yosemite, and other announcements this week

9. Hordes of cable modems, Web cams, printers can become DDoS launch platforms

10. First Look: The magnificent new Nexus 6 and Nexus 9

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment