Network World Daily News AM | | A brief history of PiThe Raspberry Pi has been the object of a great deal of nerdy affection since its initial release in 2012. A mousetrap-sized, self-contained single-board computer, the Pi is designed to serve as both an educational tool and a handy option for hobbyists – who have turned it into, well, pretty much anything you can think of. Here's a look back through the brief but illustrious history of the Pi.To read this article in full or to leave a comment, please click here | | Issue highlights 1. What it's like living on a Chromebook, Part 2 2. INSIDER 5 ways to escape password hell 3. SDN groups respond to Cisco's "game over" 4. 4 ways your competitors are stealing your IT talent 5. Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure 6. UCLA, Cisco & more join forces to replace TCP/IP 7. Watch Out for These 3 Holiday Shopping Scams 8. IDG Contributor Network: There is No Substitution for In-House Security Professionals. 9. INSIDER 8 significant software releases of 2014 10. 7 great MOOCs for techies -- all free, starting soon! 11. Does being first in supercomputing still matter? 12. Why CIOs need to embrace new norms of the hybrid cloud 13. Top tech turkeys of 2014 | : MoreDirect In this eGuide, Computerworld along with sister publications InfoWorld and CIO look at recent disaster recovery trends and offer expert opinions and advice. Read on to learn how the right disaster recovery efforts can protect your organization's data. Learn More | I spent a week living in a Chromebook, and I actually rather enjoyed it.But there were still some obstacles that prevented me from being able to use a Chromebook, and only a Chromebook, as the center of my computing world. Namely: video editing and audio editing. If I could find solutions to those, I'd be living the sweet life on this here Chromebook.See also: What it's like living on a Chromebook, Part 1 This last week I've dedicated myself to the proposition that overcoming these obstacles is possible – and I was determined to do it.To read this article in full or to leave a comment, please click here READ MORE | Security can be a vicious cycle. A breach occurs. Enterprises add a new level of security. That increases inconvenience for users, who find workarounds. Then there's another breach and the cycle begins again.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | A couple of organizations are taking issues with Cisco CEO John Chambers' claims that it's "game over" for SDN and that Cisco has won the SDN battle with its Application Centric Infrastructure. The Open Networking Foundation, which is encouraging standardization of the classical SDN model of decoupled control and data planes facilitated by the OpenFlow protocol, has butt heads with ONF member Cisco before.To read this article in full or to leave a comment, please click here READ MORE | One of the best places for your competitors to find great talent is within the walls of your company. If your best and brightest have been jumping ship to work for your biggest rival, it's important to know how they're being recruited, why they are being targeted and what you can do to stop it. Here's how your competitors may be poaching your talent.They're Using Professional Search Tactics Savvy companies know that the best talent is often already employed - with their competitors. Hiring a professional search firm -- or if that's not financially feasible, copying their subtle approach -- can lure away even the most content employees. As this Inc. Magazine article points out, targeting successful talent and then making contact via social networks like Facebook or LinkedIn, or at professional networking events, conferences or industry events with the promise of a "great opportunity" can pique their interest and entice them to consider a move.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More | Gartner IaaS Research Director Kyle Hilgendorf says one of the most common questions he gets from enterprise customers looking to go to the cloud is: AWS or Azure?Amazon Web Services has been anointed the public IaaS cloud leader by Gartner and many others, but over the past year or so Satya Nadella's Microsoft has made significant advancements to its public cloud platform. AWS now has competition.AWS clearly has a lead, and a pretty sizeable one, Hilgendorf says. But, it's a marathon, not a sprint: "The race has just begun, and it's a very long race," Hilgendorf said during a presentation at AWS re:Invent comparing the two providers.+ MORE AT NETWORK WORLD: re:Cap of re:Invent 10 Cool new features to Amazon's cloud | Hot new products from AWS re:Invent +To read this article in full or to leave a comment, please click here READ MORE | Big name academic and vendor organizations have unveiled a consortium that's pushing Named Data Networking (NDN), an emerging Internet architecture designed to better accommodate data and application access in an increasingly mobile world. READ MORE | 'Tis the season to be scamming.It's no secret that Americans are about to spend a lot of money during this upcoming holiday shopping season. Holiday sales are expected to hit nearly $617 billion this year – this after consumers spent $2.29 billion on Cyber Monday alone in 2013.That's a big pile of money and credit card numbers and passwords and logins for scammers to jump into, whether through point of sale hacks or phishing scams that go beyond just email.To read this article in full or to leave a comment, please click here READ MORE | This post is not about adequate versus inadequate cyber security professionals. Instead, it's an argument for how critical it is to employ full-time in-house cyber security professionals who are dedicated to the constant needs of one organization, versus outsourcing cyber security to a third-party managed security service provider (MSSP) and/or consulting organization.I have always been of the opinion that if one wants to gauge an organization's dedication to the protection of information, they should be asking how many full-time employees are on the payroll that are dedicated to cyber security?If the answer is none, or if the employees are part-time and have other IT responsibilities, they should look critically at the additional information that this organization provides. This is particularly important for organizations that are highly regulated and/or are common targets of cyber criminals.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Surfwatch Labs In this webcast, CSO publisher Bob Bragdon leads a discussion with SurfWatch Labs Founder and Chief Architect, Jason Polancich and Terrago Technologies Chief Executive Officer Chris Broderick, around this shift of cybersecurity responsibility from the Server Room to the Board Room. Learn More | We looked back at the multitude of software releases in 2014, and selected ones that made an impact. Many of these could continue to transform the tech industry into 2015 and beyond.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | Always be learningBig data, open source software, security -- these are some of the IT skills most in demand today and for the near future. Fortunately, free classes, in the form of Massive Open Online Courses (MOOCs), are available to help you keep pace with these and many other IT-oriented subjects. Offered by top universities as well as online education platforms (often in partnership), IT MOOCs can help you keep your skills sharp and resume updated.To read this article in full or to leave a comment, please click here READ MORE | NEW ORLEANS -- The European forecast of Hurricane Sandy in 2012 was so far ahead of U.S. models in predicting the storm's path that the National Oceanic and Atmospheric Administration was called before Congress to explain how it happened.NOAA administrator Kathryn Sullivan told lawmakers at a hearing last year that the Europeans "set a target and a policy of staying very close to the leading edge of computational capacity." That's in contrast to the U.S., which "falls further and further behind the cutting edge" and then follows it with a "big step forward," she said.That's how things work in the U.S. When the Soviets launched Sputnik in 1957, the "big step forward" for the U.S. was the moon landing in 1969. It crushed the competition.To read this article in full or to leave a comment, please click here READ MORE | Forget viewing yourself as a cloud services broker. In today's hybrid cloud enterprise the CIO's truly high value role is the creation of seamless business flows that bridge cloud and on-premisec infrastructure to help the business operate better, says Intel CIO Kim Stevenson.Hybrid Cloud: The time for adoption is upon us For most CIOs, a hybrid environment — a combination of on-premise and cloud-based infrastructure and applications — is, or soon will be, a fact of life. The real trick, she says, is to understand that hybrid isn't about cost. It is about innovation cycles and where you, as a CIO, can deliver innovation faster at better value. Innovation that allows the business to get a product to market a quarter sooner is almost certainly of much higher value than saving some cost by choosing the cheapest cloud service.To read this article in full or to leave a comment, please click here READ MORE | Giving thanksIt's that time of the year again, when people all across America sit down with their families to a nice home-cooked meal and collectively laugh at the people who did more embarrassing stuff than them. Even if that's not how you celebrate Thanksgiving, you can at least be thankful that you're not one of these people.Ted Cruz declaring 'Obamacare for the internet'Republican Senator from Texas Ted Cruz swiftly responded to President Obama's recent call for the FCC to reclassify and regulate the internet like a utility by declaring on Twitter that "net neutrality is Obamacare for the internet." No one – probably Cruz included – quite knew what he meant by this, other than to pander to the people who already support him. If people think Obamacare is bad, then just call net neutrality Obamacare and they'll think that's bad, too. The worst part is, for some people, it'll probably work.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Compuware With the right long- term strategy, next-generation IT leaders can leverage their mainframe application portfolios in ways that generate transformative business value and competitive advantage for the next 10 to 15 years - and beyond. Learn More | | | | | | | | |
No comments:
Post a Comment