High-tech

High-tech
Light

Friday, October 10, 2014

Computer engineering degrees pay off big time

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 9, 2014 11:27 AM
Subject: Computer engineering degrees pay off big time
To: <aquarianm@gmail.com>
Cc:

The Onion's 9 best bits about Microsoft

Computer lighting startup Antumbra delivers "surround sound for your eyes"

Network World Daily News AM
October 09, 2014

Computer engineering degrees pay off big time

Computer engineering majors are some of the highest paid workers in the country, according to new data analyzed by the Brookings Institution. Students who graduate with engineering degrees across a variety of fields are rewarded with high-paying jobs and have strong earning potential throughout their career, according to the recently released report. The top engineering degrees are chemical, aerospace and energy while computer engineering lands as the fourth-highest earning degree. + MORE AT NETWORK WORLD: The top 20 colleges for computer science majors, based on earnings potential +To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. The Onion's 9 best bits about Microsoft

2. Computer lighting startup Antumbra delivers "surround sound for your eyes"

3. Bill Gates: Microsoft is developing a killer meeting-room app

4. Four-digit passcodes remain a weak point in iOS 8 data encryption

5. Top 10 Windows 10 Technical Preview feedback requests after 1 week

6. Hidden gems: 10 Python tools too good to overlook

7. Millennials choose enterprise IT -- really!

8. Passpoint Wi-Fi system makes it even easier to roam between hotspots

9. Advice from an Apple tech: How to recover a mangled Windows drive with OS X

10. Here's how 200 women coders showed they can hack it

11. The wacky side of Ceatec in pictures

RESOURCE COMPLIMENTS OF: Brocade Communications Systems

The Trick to Future-Proofing Your Networking Career

Get a leg up on your peers with a free Brocade Network Functions Virtualization (NFV) Certification to future-proof your career and your network. This course will help you: Understand sophisticated, multitier networks within virtualized environments and stand out from your peers by becoming an expert within your IT organization Sign up today and get a promo code for the free Brocade Network Functions Virtualization Certification program (a $650 value), and a free 60-day trial of the Brocade Vyatta vRouter.

The Onion's 9 best bits about Microsoft

Going on two decades of ridicule The Onion, self-branded "America's Finest News Source," has been making fun of Microsoft - and, in particular, Bill Gates - since at least 1996, according to its online archive. Here are nine of what we've judged to be the best efforts. Bill Gates To Get Half Publication date: July 23, 1996To read this article in full or to leave a comment, please click here READ MORE

Computer lighting startup Antumbra delivers "surround sound for your eyes"

A startup called Antumbra run by 5 college students is looking to throw a little soothing light on this situation: People who hunker down in front of their computers until the wee hours, until it feels like their eyes might fall out. READ MORE

Bill Gates: Microsoft is developing a killer meeting-room app

Microsoft is actively developing a meeting-room application designed to streamline the entire process, including sharing data and recognizing participants, according to company co-founder Bill Gates.The disclosure is buried inside a lengthy personality profile of Microsoft executives Satya Nadella, Steve Ballmer, and Gates, describing the relationships tying together—and pushing apart—each of the three. But the article by Vanity Fair also touches tangentially on what Microsoft is actually doing these days—especially Gates, who's dedicating exactly 30 percent of his time to the company.To read this article in full or to leave a comment, please click here READ MORE

RESOURCE COMPLIMENTS OF: Wandera

Impact of Hidden Mobile Threats & What You Can Do About Them

FREE GUIDE TO MOBILE SECURITY - We only hear about the high profile cyber attacks in the news, but what about the every day threats affecting your organization right now? It's likely that you're already the unsuspecting victim of hidden mobile attacks. Find out what practical steps you can take to uncover and neutralize these threats. Download Wandera's Free Guide, The Evolution and Impact of Hidden Mobile Threats: Why your Organization Needs a Multi-Level Security Solution

Four-digit passcodes remain a weak point in iOS 8 data encryption

The strength of Apple's revised encryption scheme in iOS 8 hinges on users choosing a strong passcode or password, which they rarely do, according to a Princeton University fellow.Apple beefed up the encryption in its latest mobile operating system, protecting more sensitive data and employing more protections within hardware to make it harder to access. The new system has worried U.S. authorities, who fear it may make it more difficult to obtain data for law enforcement since Apple has no access to it.Despite the new protections, data is still vulnerable in certain circumstances, wrote Joseph Bonneau, a fellow at the Center For Information Technology Policy at Princeton, who studies password security.To read this article in full or to leave a comment, please click here READ MORE

Top 10 Windows 10 Technical Preview feedback requests after 1 week

If you are curious about what most annoys Windows 10 Technical Preview users so far, then here a Windows 10 top 10 most popular feedback requests so far. READ MORE

Hidden gems: 10 Python tools too good to overlook

Hidden gems: 10 Python tools too good to overlook Want a good reason for Python's smashing success as a language? Look no further than its massive collection of first- and third-party libraries. With so many libraries out there, though, it's no surprise some get crowded out and don't quite grab the attention they deserve. Plus, programmers who work exclusively in one domain don't always know about the goodies that may be available to them through libraries created for other kinds of work.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Enterprise Management Associates

Best Practices for Automation and Limiting Risk

Everyone knows that effective network management practices start with establishing a full foundational understanding of the network. But simply monitoring individual elements can only get you so far. Learn More

Millennials choose enterprise IT -- really!

As a millennial entering the workforce, Amy Jackson had an enviable array of experiences under her belt.While earning multiple degrees from Michigan State University, Jackson worked as an intern in the operations department of a large insurance company, helping to identify how technology could improve day-to-day business processes. She spent time at a large automaker, charged with similar responsibilities, and she delved into online search and Web technologies while interning at small, 25-person digital marketing shop. Amy Jackson, a business analyst with Dow Chemical, wanted the greatest breadth of experience in the shortest amount of time, with room to grow her career. Exposure to IT life in both large and small organizations pointed Jackson toward the track she wanted to take after graduating with a B.A. in marketing, a B.S. in retailing and a minor in IT management. While the fast-moving pace and camaraderie of a small, youthful culture held appeal, Jackson opted instead for a well-defined career path at a traditional company. Her reasoning? That route would provide the broadest exposure across both technology and the business.To read this article in full or to leave a comment, please click here READ MORE

Passpoint Wi-Fi system makes it even easier to roam between hotspots

The Wi-Fi Passpoint system continues to toil in relative obscurity, with most people unaware that a network of open Wi-Fi hotspots can be easily accessed via your phone or tablet. A Wednesday upgrade will make it even easier to get started.Passpoint works like the network of cell-phone towers that your phone uses. As you drive down the freeway, for instance, your phone's signal is handed off from one tower to the next. Passpoint works the same way, allowing your mobile device to jump from one hotspot to the next—along San Francisco's Market Street, for example.To read this article in full or to leave a comment, please click here READ MORE

Advice from an Apple tech: How to recover a mangled Windows drive with OS X

Chris Barylick had a problem: He'd inadvertently dropped his sister's PC laptop on the floor, munging its hard drive. Turns out his Mac was the best tool for fixing it. READ MORE

Here's how 200 women coders showed they can hack it

Here's how 200 women coders showed they can hack it More than 200 women participated in Hackbright Academy's Silicon Chef hardware hackathon. The two-day event culminated in 27 hardware projects. From: Network World Views: 0 0 ratings Time: 02:54 More in Science & Technology READ MORE

The wacky side of Ceatec in pictures

Sandwiched between the IFA and CES electronics trade shows, Japan's Ceatec is fighting to stay relevant. But while the number of vendors at this year's Ceatec was down to 547 from 587 last year, with the notable absence of Sony, there was no shortage of unusual sights and exhibits. From sign-language androids to smartphone-controlled dinosaurs and table tennis robots, here's a look at the wacky site of the technology expo just outside of Tokyo.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Citrix Systems

Understanding Liquid Computing and Handoff

The greater the number computing devices we use, the more the center of our computing life shifts to the cloud. The last thing anyone wants is for data and preferences to be locked in a smartphone, tablet, or desktop. Learn More

SLIDESHOWS

9 useful add-ons for Google Docs

Here are nine that we found to be really useful and easy to use when you're writing, editing and sharing documents.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Gartner: IT careers – what's hot?

2. Why did Microsoft skip Windows 9 and jump to Windows 10?

3. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

4. 'Unlawful' WiFi hotspot blocking ruling highlights academic IT headaches

5. 15 GOTO schools for the best programming jobs

6. Microsoft reveals biggest-ever change in Windows

7. Secret ad beacon network uncovered, shut down in New York City

8. Should Cisco make like HP, and split?

9. Nadella wins over Gartner crowd

10. McAfee's most dangerous cyber celebrities of 2014

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment