Network World Daily News AM | | Computer engineering majors are some of the highest paid workers in the country, according to new data analyzed by the Brookings Institution. Students who graduate with engineering degrees across a variety of fields are rewarded with high-paying jobs and have strong earning potential throughout their career, according to the recently released report. The top engineering degrees are chemical, aerospace and energy while computer engineering lands as the fourth-highest earning degree. + MORE AT NETWORK WORLD: The top 20 colleges for computer science majors, based on earnings potential +To read this article in full or to leave a comment, please click here | | Issue highlights 1. The Onion's 9 best bits about Microsoft 2. Computer lighting startup Antumbra delivers "surround sound for your eyes" 3. Bill Gates: Microsoft is developing a killer meeting-room app 4. Four-digit passcodes remain a weak point in iOS 8 data encryption 5. Top 10 Windows 10 Technical Preview feedback requests after 1 week 6. Hidden gems: 10 Python tools too good to overlook 7. Millennials choose enterprise IT -- really! 8. Passpoint Wi-Fi system makes it even easier to roam between hotspots 9. Advice from an Apple tech: How to recover a mangled Windows drive with OS X 10. Here's how 200 women coders showed they can hack it 11. The wacky side of Ceatec in pictures | RESOURCE COMPLIMENTS OF: Brocade Communications Systems Get a leg up on your peers with a free Brocade Network Functions Virtualization (NFV) Certification to future-proof your career and your network. This course will help you: Understand sophisticated, multitier networks within virtualized environments and stand out from your peers by becoming an expert within your IT organization Sign up today and get a promo code for the free Brocade Network Functions Virtualization Certification program (a $650 value), and a free 60-day trial of the Brocade Vyatta vRouter. | Going on two decades of ridicule The Onion, self-branded "America's Finest News Source," has been making fun of Microsoft - and, in particular, Bill Gates - since at least 1996, according to its online archive. Here are nine of what we've judged to be the best efforts. Bill Gates To Get Half Publication date: July 23, 1996To read this article in full or to leave a comment, please click here READ MORE | A startup called Antumbra run by 5 college students is looking to throw a little soothing light on this situation: People who hunker down in front of their computers until the wee hours, until it feels like their eyes might fall out. READ MORE | Microsoft is actively developing a meeting-room application designed to streamline the entire process, including sharing data and recognizing participants, according to company co-founder Bill Gates.The disclosure is buried inside a lengthy personality profile of Microsoft executives Satya Nadella, Steve Ballmer, and Gates, describing the relationships tying together—and pushing apart—each of the three. But the article by Vanity Fair also touches tangentially on what Microsoft is actually doing these days—especially Gates, who's dedicating exactly 30 percent of his time to the company.To read this article in full or to leave a comment, please click here READ MORE | RESOURCE COMPLIMENTS OF: Wandera FREE GUIDE TO MOBILE SECURITY - We only hear about the high profile cyber attacks in the news, but what about the every day threats affecting your organization right now? It's likely that you're already the unsuspecting victim of hidden mobile attacks. Find out what practical steps you can take to uncover and neutralize these threats. Download Wandera's Free Guide, The Evolution and Impact of Hidden Mobile Threats: Why your Organization Needs a Multi-Level Security Solution | The strength of Apple's revised encryption scheme in iOS 8 hinges on users choosing a strong passcode or password, which they rarely do, according to a Princeton University fellow.Apple beefed up the encryption in its latest mobile operating system, protecting more sensitive data and employing more protections within hardware to make it harder to access. The new system has worried U.S. authorities, who fear it may make it more difficult to obtain data for law enforcement since Apple has no access to it.Despite the new protections, data is still vulnerable in certain circumstances, wrote Joseph Bonneau, a fellow at the Center For Information Technology Policy at Princeton, who studies password security.To read this article in full or to leave a comment, please click here READ MORE | If you are curious about what most annoys Windows 10 Technical Preview users so far, then here a Windows 10 top 10 most popular feedback requests so far. READ MORE | Hidden gems: 10 Python tools too good to overlook Want a good reason for Python's smashing success as a language? Look no further than its massive collection of first- and third-party libraries. With so many libraries out there, though, it's no surprise some get crowded out and don't quite grab the attention they deserve. Plus, programmers who work exclusively in one domain don't always know about the goodies that may be available to them through libraries created for other kinds of work.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Enterprise Management Associates Everyone knows that effective network management practices start with establishing a full foundational understanding of the network. But simply monitoring individual elements can only get you so far. Learn More | As a millennial entering the workforce, Amy Jackson had an enviable array of experiences under her belt.While earning multiple degrees from Michigan State University, Jackson worked as an intern in the operations department of a large insurance company, helping to identify how technology could improve day-to-day business processes. She spent time at a large automaker, charged with similar responsibilities, and she delved into online search and Web technologies while interning at small, 25-person digital marketing shop. Amy Jackson, a business analyst with Dow Chemical, wanted the greatest breadth of experience in the shortest amount of time, with room to grow her career. Exposure to IT life in both large and small organizations pointed Jackson toward the track she wanted to take after graduating with a B.A. in marketing, a B.S. in retailing and a minor in IT management. While the fast-moving pace and camaraderie of a small, youthful culture held appeal, Jackson opted instead for a well-defined career path at a traditional company. Her reasoning? That route would provide the broadest exposure across both technology and the business.To read this article in full or to leave a comment, please click here READ MORE | The Wi-Fi Passpoint system continues to toil in relative obscurity, with most people unaware that a network of open Wi-Fi hotspots can be easily accessed via your phone or tablet. A Wednesday upgrade will make it even easier to get started.Passpoint works like the network of cell-phone towers that your phone uses. As you drive down the freeway, for instance, your phone's signal is handed off from one tower to the next. Passpoint works the same way, allowing your mobile device to jump from one hotspot to the next—along San Francisco's Market Street, for example.To read this article in full or to leave a comment, please click here READ MORE | Chris Barylick had a problem: He'd inadvertently dropped his sister's PC laptop on the floor, munging its hard drive. Turns out his Mac was the best tool for fixing it. READ MORE | Here's how 200 women coders showed they can hack it More than 200 women participated in Hackbright Academy's Silicon Chef hardware hackathon. The two-day event culminated in 27 hardware projects. From: Network World Views: 0 0 ratings Time: 02:54 More in Science & Technology READ MORE | Sandwiched between the IFA and CES electronics trade shows, Japan's Ceatec is fighting to stay relevant. But while the number of vendors at this year's Ceatec was down to 547 from 587 last year, with the notable absence of Sony, there was no shortage of unusual sights and exhibits. From sign-language androids to smartphone-controlled dinosaurs and table tennis robots, here's a look at the wacky site of the technology expo just outside of Tokyo.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Citrix Systems The greater the number computing devices we use, the more the center of our computing life shifts to the cloud. The last thing anyone wants is for data and preferences to be locked in a smartphone, tablet, or desktop. Learn More | | | | | | | |
No comments:
Post a Comment