High-tech

High-tech
Light

Friday, October 24, 2014

Hottest new products of the week 10.20.2014

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 24, 2014 8:37 AM
Subject: Hottest new products of the week 10.20.2014
To: <aquarianm@gmail.com>
Cc:

IT certifications: Discover where the value lies

2014 technology industry graveyard

Network World Daily News AM
October 24, 2014

Hottest new products of the week 10.20.2014

Our roundup of intriguing new products.

READ MORE
 

Issue highlights

1. IT certifications: Discover where the value lies

2. 2014 technology industry graveyard

3. Hacker group leader gets 24 months in federal prison for attacking US Navy, 50 other institutions

4. One missed email and Google Inbox will be in trouble

5. The 'Backoff' malware linked to data breaches is spreading

6. Why – and how – to do a better job of listening to your end user customers

7. 5 tips for transforming enterprise IT towers into cloud services

8. IDG Contributor Network: The promise of NFV for the enterprise

9. Microsoft exec opens up about Research lab closure, layoffs

10. Why EMC acquired VCE from Cisco

11. Industry reacts to Cisco cutting stake in VCE, EMC taking control

12. 15 Must-Have Android, iOS apps for business travelers

: WhiteHat Security, Inc.

Application Security eGuide

In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

IT certifications: Discover where the value lies

Knowing which certification will help elevate your career or land a job is not only difficult, it's different among different facets of IT.Also, the best-known certifications aren't necessarily the ones that will help you succeed. In fact, analysts warn that some certification vendors can throw enough money into promotion of their certifications to move the engagement needle, making the choice of which certification to choose even more difficult."The good ones are almost always performance-oriented and have a laboratory component involved that proves candidates can use their knowledge in the real world, "says Subhash Tantry, president of certification, testing and assessment platform provider Mettl.To read this article in full or to leave a comment, please click here READ MORE

2014 technology industry graveyard

Microsoft, Google, Intel, BlackBerry and others bid farewell to brands, projects and more. READ MORE

Hacker group leader gets 24 months in federal prison for attacking US Navy, 50 other institutions

One of the two leaders of the hacking group known as Team Digi7al was sentenced to 24 months in federal prison today for his role in hacking the U.S. Navy, National Geospatial-Intelligence Agency, and over 50 public and private computer systems including the World Health Organization, the Los Alamos National Laboratory, Harvard , two police departments and the Department of Homeland Security, according to U.S. Attorney Danny C. Williams.+More on Network World: Gartner: IT careers – what's hot?+Daniel Trenton Krueger, 20, of Dix, Illinois, previously pleaded guilty before U.S. District Judge James H. Payne on May 20, and was initially charged in a single-count information on May 5, 2014. At the time of the hacking Krueger was a student, Williams stated.To read this article in full or to leave a comment, please click here READ MORE

One missed email and Google Inbox will be in trouble

People may feel overwhelmed by the deluge of email arriving in their inboxes, but will they trust Google to show them the most important messages?Analysts are divided on how well Google can sort and prioritize users' emails as the company launches Inbox, an email application built without any reliance on the company's longstanding and popular Gmail service.MORE ON NETWORK WORLD: Why Google Apps is winning IT hearts and minds "Users are upset about the volume of email messages they're receiving, but a lot of people might be unconvinced that Google can decide for them what's important and what's not," said Dan Olds, an analyst with The Gabriel Consulting Group. "Most people would be concerned about important emails dropping through the cracks, or even just interesting emails."To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Flexera Software

Six Steps to Continuous Application Readiness

This paper outlines the six key steps of an Application Readiness process, and explains how Flexera® Software's solutions, AdminStudio Suite and App Portal, can reduce the risk and cost of ongoing service transitions by providing a consistent approach to delivering application services on a regular basis. Learn More>>

The 'Backoff' malware linked to data breaches is spreading

The number of computers in North America infected by the Backoff malware, which is blamed for a string of payment card breaches, has risen sharply, according to research from network security company Damballa.The company detected a 57 percent increase between August and September in devices infected with Backoff, which scrapes a computer's RAM for leftover credit card data after a payment card has been swiped, said Brian Foster, Damballa's CTO.Damballa based its finding on data it collects from its ISP and enterprise customers, who use its traffic analysis products to detect malicious activity.Damballa sees about 55 percent of internet traffic from North America, including DNS requests, though for privacy reasons it doesn't know the IP addresses of most of those computers, Foster said.To read this article in full or to leave a comment, please click here READ MORE

Why – and how – to do a better job of listening to your end user customers

Flickr/Roland Tanglao You wouldn't think that an IT manager can learn many end user best practices from the car industry, but you'd be wrong. Certainly this hasn't been the best of years for carmakers. But attending the latest Teradata Partners annual conference in Nashville earlier this month, there were some interesting lessons worth repeating, some from that beleaguered industry. In many cases, IT managers can learn from these best and worst customer interaction stories.To read this article in full or to leave a comment, please click here READ MORE

5 tips for transforming enterprise IT towers into cloud services

As companies adopt more cloud IT services and work with an increasing number of service providers, the tried-and-true IT towers of the past no longer serve their needs. "The old model lacks the clarity of ownership required to drive decisions on as-a-service offerings that span the traditional tower structure," says Steve Keegan, principal with outsourcing consultancy Pace Harmon. "Determining who makes the call isn't straightforward -- the server team, the app team or the database team?" IT groups need to reorganize around processes rather than technology areas, such as infrastructure or applications. In process-driven IT organizations, "people are focused on activities that are of long-term benefit to the organization with clear accountabilities and increased efficiencies in how work gets done," Keegan says.To read this article in full or to leave a comment, please click here READ MORE

IDG Contributor Network: The promise of NFV for the enterprise

All of us involved in networking understand the promised benefits of Network Functions Virtualization (NFV): it reduces the hardware, power, and space requirements to deploy network functions on industry-standard high-volume servers, switches and storage; it reduces provisioning times; it can be used to create smaller fault domains; it makes the applications portable and upgradeable with software; and so on.NFV represents a bold step toward software-defined services and programmable networks, a step that will impact all aspects of the communications industry for years to come. With the market forecast to reach approximately $5 billion by 2018, according to Doyle Research, it would seem obvious that one cannot – or perhaps should not – ignore the opportunity.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: ForgeRock

How to Forge a Future with Identity Relationship Management

Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. View Now>>

Microsoft exec opens up about Research lab closure, layoffs

Microsoft Research It's been a bit over a month since Microsoft shuttered its Microsoft Research lab in Silicon Valley as part of the company's broader restructuring that will include 18,000 layoffs. This week, Harry Shum, Microsoft EVP of Technology & Research, posted what he termed an "open letter to the academic research community" on the company's research blog.To read this article in full or to leave a comment, please click here READ MORE

Why EMC acquired VCE from Cisco

This morning before its earnings call, EMC issued a press release stating it had acquired controlling interesting in the joint venture (JV) known as VCE. The JV was created by Cisco and EMC with minority investments from VMware and Intel to create the converged infrastructure market. Following the acquisition, EMC will own 90% of the JV, with Cisco maintaining about a 10% stake in the company.The companies formed VCE to develop an integrated, validated, pre-tested converged solution that customers could use to stand up a private cloud in just a few days. There are literally tens of thousands, maybe even hundreds of thousands, of configuration parameters required to stitch V, C and E together. The JV took much of the mystery out of that, at least 80% to 90%, with the remaining 10% to 20% being used to customize the solution for specific environments.To read this article in full or to leave a comment, please click here READ MORE

Industry reacts to Cisco cutting stake in VCE, EMC taking control

[View the story "VCE shake-up: EMC takes control, Cisco cuts stake" on Storify] To read this article in full or to leave a comment, please click here READ MORE

15 Must-Have Android, iOS apps for business travelers

Seasoned business travelers share their favorite Android and iOS apps for booking flights and hotels, navigating airports and unfamiliar cities, staying in touch while on the move, and much more. READ MORE

WHITE PAPER: NetBrain Technologies

Applying Automation to Maintain Accurate Network Diagrams

Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

SLIDESHOWS

How giant companies see the cloud

16 large enterprises talk about their use of the cloud, their plans, challenges they've run into and how they're approaching the skills issues.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why EMC acquired VCE from Cisco

2. Monumental day for Wikipedia in Poland

3. Google rethinks webmail with Inbox, raising questions about Gmail's future

4. Review: Android 5.0 'Lollipop' is everything I hoped it would be

5. What you'll love and hate about Windows 10

6. OS X Yosemite tips and tricks you need to know

7. USB is now UEC (use with extreme caution)

8. Why do cell phones still suck for calling?

9. Microsoft misses Windows bug, hackers slip past patch

10. Cisco slashing stake in VCE joint venture with EMC

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment