High-tech

High-tech
Light

Thursday, October 9, 2014

Gartner: Top 10 strategic predictions for businesses

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 7, 2014 7:43 AM
Subject: Gartner: Top 10 strategic predictions for businesses
To: <aquarianm@gmail.com>
Cc:

Why Google hiring 200 security guards is a big deal

Microsoft and other firms take pledge to protect student privacy

Network World Daily News AM
October 07, 2014

Gartner: Top 10 strategic predictions for businesses

For a session that is high-tech oriented, this year's Gartner strategic predictions were decidedly human. That is to say many were related to increasing the customer's experience with technology and systems rather than the usual techno-calculations.+More on Network World: Gartner: Make way for digital business or die?+"Machines are taking an active role in enhancing human endeavors," said Daryl Plummer is a managing vice president, chief of Research and chief Gartner Fellow. "Our predictions this year maybe not be directly tied to the IT or CIO function but they will affect what you do."To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Why Google hiring 200 security guards is a big deal

2. Microsoft and other firms take pledge to protect student privacy

3. Yahoo says attackers looking for Shellshock found a different bug

4. AT&T fired employee who improperly accessed customer accounts

5. Blowing the whistle without blowing your career

6. Elliptic Labs smartphone is controlled by waving at it

7. VCE rolls out an all-in-one system with EMC's all-flash XtremIO array

8. HP Enterprise: What to watch

9. Breach blanket: To contain the damage, plan ahead – way ahead

10. 9 useful add-ons for Google Docs

WHITE PAPER: Kaminario

Testing of VMware View VDI on Kaminario K2 storage

This technical report covers detailed performance and efficiency tests for the Kaminario K2 array supporting VMware Horizon View virtual desktops that quantify its ability to support a range of critical VDI workloads. Learn More>>

Why Google hiring 200 security guards is a big deal

From janitorial services to software development, many jobs at Google and other big Silicon Valley companies come from third-party contractors that don't offer the same pay, benefits, or job security as the companies do. Google's recent decision to end an agreement with one such controversial contractor could reverberate across the industry. READ MORE

Microsoft and other firms take pledge to protect student privacy

Fourteen companies have promised not to sell student data or use it for advertising READ MORE

Yahoo says attackers looking for Shellshock found a different bug

The bug has now been fixed and user data was not at risk, the company said READ MORE

RESOURCE COMPLIMENTS OF: Brocade Communications Systems

The Trick to Future-Proofing Your Networking Career

Get a leg up on your peers with a free Brocade Network Functions Virtualization (NFV) Certification to future-proof your career and your network. This course will help you: Understand sophisticated, multitier networks within virtualized environments and stand out from your peers by becoming an expert within your IT organization Sign up today and get a promo code for the free Brocade Network Functions Virtualization Certification program (a $650 value), and a free 60-day trial of the Brocade Vyatta vRouter.

AT&T fired employee who improperly accessed customer accounts

AT&T fired an employee who improperly accessed about 1,600 customer accounts and could have viewed customers' Social Security and driver's license numbers.The breach came to light after a form letter that AT&T sent to affected customers was submitted to Vermont's attorney general's office, which published it on its website.Mark Siegel, executive director of media relations for AT&T Mobility, said in a statement that one of the company's employees "did not follow our strict privacy rules and inappropriately obtained some customer information."To read this article in full or to leave a comment, please click here READ MORE

Blowing the whistle without blowing your career

How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. READ MORE

Elliptic Labs smartphone is controlled by waving at it

Sick of fingering your smartphone's touchscreen? How about just waving at it?Elliptic Labs thinks it's easier and more intuitive to wave at a smartphone than to touch it as a control method.At the Ceatec 2014 technology show outside Tokyo, the Norwegian startup exhibited a smartphone control method it calls Multi Layer Interaction. It allows users to display different content on a phone depending on the location and distance between their hand and the screen.During a demonstration, an Elliptic staffer moved his hand toward the screen on a prototype smartphone. The device immediately displayed the home screen on its Android OS. When he moved his hand closer, the device scrolled through various other menu levels.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Ping Identity

5 Reasons It's Time For Secure Single Sign-On

While cloud-based applications provide many business benefits including lowering capital expenditures, they can also drive up operational expenses by requiring more administration and lowering employee productivity due to more application login-ins, password resets and helpdesk calls. Learn More

VCE rolls out an all-in-one system with EMC's all-flash XtremIO array

The joint venture also refreshed the large-scale 700 line and smaller 200 series READ MORE

HP Enterprise: What to watch

Hewlett-Packard's move to break up the company sets up the enterprise side of the business for a fresh attack on rivals such as Oracle and IBM.Hewlett-Packard Enterprise will be led by Meg Whitman, while Dion Weisler heads up the company's PC and printer business, which will be called HP Inc. The enterprise business incudes HP's software, services and server businesses. The separation is expected to be completed by October 2015.While it's not clear how closely the two halves of the company had been working together anyway, here's a look at what the change means for HP, and what strategies HP Enterprise may pursue moving forward.To read this article in full or to leave a comment, please click here READ MORE

Breach blanket: To contain the damage, plan ahead – way ahead

Data breaches are inevitable. But the ways IT leaders respond to them are not.A rapid, effective response can make the difference between results that are catastrophic at all levels – brand identity, market share and financial health – and those that are relatively harmless.As more than one expert has said, it is impossible to prevent all breaches, but if a response team can prevent attackers from completing their mission, or even reduce the damage they do, the good guys have won that battle.[ How a good CSO confronts bad news ]To read this article in full or to leave a comment, please click here READ MORE

9 useful add-ons for Google Docs

READ MORE

WHITE PAPER: UMT360

Redefining the Enterprise Architect's Role

The practice of Enterprise Architecture is undergoing a significant transformation. According to Gartner, the majority of enterprise architects will change their mission and focus on aligning business and IT strategies, delivering value, and enabling a major business transformation. View Now>>

SLIDESHOWS

9 useful add-ons for Google Docs

Here are nine that we found to be really useful and easy to use when you're writing, editing and sharing documents.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why did Microsoft skip Windows 9 and jump to Windows 10?

2. Windows 10 security, privacy and manageability features

3. Will Windows 10 address the operating system's biggest weakness?

4. The 10 worst people you meet working in IT

5. President Obama honors standout computer scientists with National Medals

6. DARPA delving into the black art of super secure software obfuscation

7. 7 killer open source monitoring tools

8. Dubai police to use Google Glass for facial recognition

9. Why Windows 10 isn't named 9: Windows 95 legacy code?

10. More notable Cisco departures

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment