Network World Daily News AM | | Our roundup of intriguing new products. | | Issue highlights 1. IT certifications: Discover where the value lies 2. 2014 technology industry graveyard 3. Hacker group leader gets 24 months in federal prison for attacking US Navy, 50 other institutions 4. One missed email and Google Inbox will be in trouble 5. The 'Backoff' malware linked to data breaches is spreading 6. Why – and how – to do a better job of listening to your end user customers 7. 5 tips for transforming enterprise IT towers into cloud services 8. IDG Contributor Network: The promise of NFV for the enterprise 9. Microsoft exec opens up about Research lab closure, layoffs 10. Why EMC acquired VCE from Cisco 11. Industry reacts to Cisco cutting stake in VCE, EMC taking control 12. 15 Must-Have Android, iOS apps for business travelers | : WhiteHat Security, Inc. In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >> | Knowing which certification will help elevate your career or land a job is not only difficult, it's different among different facets of IT.Also, the best-known certifications aren't necessarily the ones that will help you succeed. In fact, analysts warn that some certification vendors can throw enough money into promotion of their certifications to move the engagement needle, making the choice of which certification to choose even more difficult."The good ones are almost always performance-oriented and have a laboratory component involved that proves candidates can use their knowledge in the real world, "says Subhash Tantry, president of certification, testing and assessment platform provider Mettl.To read this article in full or to leave a comment, please click here READ MORE | Microsoft, Google, Intel, BlackBerry and others bid farewell to brands, projects and more. READ MORE | One of the two leaders of the hacking group known as Team Digi7al was sentenced to 24 months in federal prison today for his role in hacking the U.S. Navy, National Geospatial-Intelligence Agency, and over 50 public and private computer systems including the World Health Organization, the Los Alamos National Laboratory, Harvard , two police departments and the Department of Homeland Security, according to U.S. Attorney Danny C. Williams.+More on Network World: Gartner: IT careers – what's hot?+Daniel Trenton Krueger, 20, of Dix, Illinois, previously pleaded guilty before U.S. District Judge James H. Payne on May 20, and was initially charged in a single-count information on May 5, 2014. At the time of the hacking Krueger was a student, Williams stated.To read this article in full or to leave a comment, please click here READ MORE | People may feel overwhelmed by the deluge of email arriving in their inboxes, but will they trust Google to show them the most important messages?Analysts are divided on how well Google can sort and prioritize users' emails as the company launches Inbox, an email application built without any reliance on the company's longstanding and popular Gmail service.MORE ON NETWORK WORLD: Why Google Apps is winning IT hearts and minds "Users are upset about the volume of email messages they're receiving, but a lot of people might be unconvinced that Google can decide for them what's important and what's not," said Dan Olds, an analyst with The Gabriel Consulting Group. "Most people would be concerned about important emails dropping through the cracks, or even just interesting emails."To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Flexera Software This paper outlines the six key steps of an Application Readiness process, and explains how Flexera® Software's solutions, AdminStudio Suite and App Portal, can reduce the risk and cost of ongoing service transitions by providing a consistent approach to delivering application services on a regular basis. Learn More>> | The number of computers in North America infected by the Backoff malware, which is blamed for a string of payment card breaches, has risen sharply, according to research from network security company Damballa.The company detected a 57 percent increase between August and September in devices infected with Backoff, which scrapes a computer's RAM for leftover credit card data after a payment card has been swiped, said Brian Foster, Damballa's CTO.Damballa based its finding on data it collects from its ISP and enterprise customers, who use its traffic analysis products to detect malicious activity.Damballa sees about 55 percent of internet traffic from North America, including DNS requests, though for privacy reasons it doesn't know the IP addresses of most of those computers, Foster said.To read this article in full or to leave a comment, please click here READ MORE | Flickr/Roland Tanglao You wouldn't think that an IT manager can learn many end user best practices from the car industry, but you'd be wrong. Certainly this hasn't been the best of years for carmakers. But attending the latest Teradata Partners annual conference in Nashville earlier this month, there were some interesting lessons worth repeating, some from that beleaguered industry. In many cases, IT managers can learn from these best and worst customer interaction stories.To read this article in full or to leave a comment, please click here READ MORE | As companies adopt more cloud IT services and work with an increasing number of service providers, the tried-and-true IT towers of the past no longer serve their needs. "The old model lacks the clarity of ownership required to drive decisions on as-a-service offerings that span the traditional tower structure," says Steve Keegan, principal with outsourcing consultancy Pace Harmon. "Determining who makes the call isn't straightforward -- the server team, the app team or the database team?" IT groups need to reorganize around processes rather than technology areas, such as infrastructure or applications. In process-driven IT organizations, "people are focused on activities that are of long-term benefit to the organization with clear accountabilities and increased efficiencies in how work gets done," Keegan says.To read this article in full or to leave a comment, please click here READ MORE | All of us involved in networking understand the promised benefits of Network Functions Virtualization (NFV): it reduces the hardware, power, and space requirements to deploy network functions on industry-standard high-volume servers, switches and storage; it reduces provisioning times; it can be used to create smaller fault domains; it makes the applications portable and upgradeable with software; and so on.NFV represents a bold step toward software-defined services and programmable networks, a step that will impact all aspects of the communications industry for years to come. With the market forecast to reach approximately $5 billion by 2018, according to Doyle Research, it would seem obvious that one cannot – or perhaps should not – ignore the opportunity.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: ForgeRock Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. View Now>> | Microsoft Research It's been a bit over a month since Microsoft shuttered its Microsoft Research lab in Silicon Valley as part of the company's broader restructuring that will include 18,000 layoffs. This week, Harry Shum, Microsoft EVP of Technology & Research, posted what he termed an "open letter to the academic research community" on the company's research blog.To read this article in full or to leave a comment, please click here READ MORE | This morning before its earnings call, EMC issued a press release stating it had acquired controlling interesting in the joint venture (JV) known as VCE. The JV was created by Cisco and EMC with minority investments from VMware and Intel to create the converged infrastructure market. Following the acquisition, EMC will own 90% of the JV, with Cisco maintaining about a 10% stake in the company.The companies formed VCE to develop an integrated, validated, pre-tested converged solution that customers could use to stand up a private cloud in just a few days. There are literally tens of thousands, maybe even hundreds of thousands, of configuration parameters required to stitch V, C and E together. The JV took much of the mystery out of that, at least 80% to 90%, with the remaining 10% to 20% being used to customize the solution for specific environments.To read this article in full or to leave a comment, please click here READ MORE | [View the story "VCE shake-up: EMC takes control, Cisco cuts stake" on Storify] To read this article in full or to leave a comment, please click here READ MORE | Seasoned business travelers share their favorite Android and iOS apps for booking flights and hotels, navigating airports and unfamiliar cities, staying in touch while on the move, and much more. READ MORE | WHITE PAPER: NetBrain Technologies Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More | | | | | | | |
No comments:
Post a Comment