High-tech

High-tech
Light

Wednesday, October 8, 2014

Guess how many U.S. lawmakers have a Windows Phone?

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 8, 2014 9:14 PM
Subject: Guess how many U.S. lawmakers have a Windows Phone?
To: <aquarianm@gmail.com>
Cc:

  2014 technology industry graveyard | Gartner: IT careers – what's hot?

 
  Network World After Dark  

Guess how many U.S. lawmakers have a Windows Phone?
According to a survey conducted by The Hill, about 7 in 10 U.S. lawmakers carry an iPhone.That's a higher percentage than the public at large, but scarcely a surprise. Read More
 


WHITE PAPER: Open Text

Global Growing Pains: Tapping into B2B Integration Services
A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities they're seeking in B2B integration partners. Learn More

WEBCAST: Ping Identity

BYOD – It's Not about the Device
BYOD creates issues with protecting business applications and data. It is hard to protect these devices with the traditional model of IAM. Explore how modern identity protocols like OAuth & OpenID Connect enables this separation, protecting both the employee's privacy and the enterprise's data. Learn More>>

2014 technology industry graveyard
Microsoft, Google, Intel, BlackBerry and others bid farewell to brands, projects and more. Read More
 

Gartner: IT careers – what's hot?
ORLANDO— If you are to believe the experts here a the Gartner IT Symposium IT workers and managers will need to undergo wide-spread change if they are to effectively compete for jobs in the next few years.How much change? Well Gartner says by 2018, digital business requires 50% less business process workers and 500% more key digital business jobs, compared to traditional models. IT leaders will need to develop new hiring practices to recruit for the new nontraditional IT roles. + MORE FROM GARTNER: Top 10 strategic predictions for businesses to watch for +To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
12 tips to tune your Wi-Fi network
More and more people are looking for Wi-Fi connectivity, especially at public venues -- on their laptops, smartphones and tablets -- to help conserve cellular data usage. Read More
 

 

Store shelves that look back at you
Fujitsu has developed a small sensor that can tell which products you're most interested in. Read More
 

McAfee, think tank push online voting, but recognize security risks
The U.S. and other nations should look toward Internet voting to make it easier for disabled and elderly people to cast ballots, and to increase participation among young people, but online security remains a huge hurdle, according to a new paper for the Atlantic Council and McAfee.Online voting has "the power to revolutionize the democratic process around the world," said the paper, released Wednesday by the think tank and Intel's security division. However, online security will "need to be vastly improved."With the paper, the Atlantic Council and McAfee are pushing to "change the nature of the cybersecurity debate," said Tom Gann, McAfee's vice president of government relations. "Our goal is to move the public discussion from one that all too often focuses on gloom and doom, to one that focuses on the age of the possible."To read this article in full or to leave a comment, please click here Read More
 

Proofpoint Report Exposes Details about Cybercrime Division-of-Labor and Malware Architecture
One of the more vapid cybersecurity cliché statements goes something like this:  "Hacking is no longer about alienated teenagers spending countless hours in the basement on their PCs.  Rather, it is now the domain of organized crime and nation states."  While this is certainly true, it is also blatantly obvious.  It is also nothing more than a meaningless platitude with no details about why this is true, how hackers operate differently than teenagers, or what the implications are.If you want to understand these issues, I strongly suggest that you read a new threat report, Analysis of a Cybercrime Infrastructure, published this week by Proofpoint.  The report follows the tactics and techniques used by a Russian organized crime group as it launched an attack on US- and European-based users aimed at stealing online banking credentials.To read this article in full or to leave a comment, please click here Read More
 

First look: Windows 10
Microsoft's first glimpse of next year's new Windows fixes obvious flaws and borrows from Apple's OSes Read More
 

Gartner: Top 10 Technology Trends for 2015 IT can't ignore
ORLANDO—Gartner defines its Strategic Technology Trends as those technologies that have the most potential to drive great change in the enterprise IT arena in the next three years.Indeed this year's crop has that potential as trends like software-defined networks and 3D printing take center stage in Gartner's list.+More on Network World: Gartner: IT careers – what's hot?+"You need to be looing at linking to customers in new and unique ways; what technologies set the foundation to enable these moves," said Gartner vice president David Cearly. IT will be dealing with everything from virtual technologies to intelligent machines and analytics data everywhere, he said. "And in the end all things run through a completely secure environment."To read this article in full or to leave a comment, please click here Read More
 

The 2014 Ig Nobel Prize winners
The bizarre, insane and otherwise way-out winners of science's Razzies. Read More
 

 

SLIDESHOWS

9 useful add-ons for Google Docs

Here are nine that we found to be really useful and easy to use when you're writing, editing and sharing documents.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Gartner: IT careers – what's hot?

2. Why did Microsoft skip Windows 9 and jump to Windows 10?

3. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

4. 'Unlawful' WiFi hotspot blocking ruling highlights academic IT headaches

5. 15 GOTO schools for the best programming jobs

6. Microsoft reveals biggest-ever change in Windows

7. Secret ad beacon network uncovered, shut down in New York City

8. Should Cisco make like HP, and split?

9. Nadella wins over Gartner crowd

10. McAfee's most dangerous cyber celebrities of 2014


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment