High-tech

High-tech
Light

Wednesday, December 10, 2014

Full-time IT hiring is gaining ground, finally

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 9, 2014 2:09 PM
Subject: Full-time IT hiring is gaining ground, finally
To: <aquarianm@gmail.com>
Cc:

Mobile device makers unleash FIDO

Apple CEO Tim Cook among 8 finalists for Time's Person of the Year

Network World Daily News PM
December 09, 2014

Full-time IT hiring is gaining ground, finally

The end of the year is sometimes seen as an ideal time to find a new job. You pick up your year-end bonus, enjoy the holiday parties, and then plot your exit for something new.This year, the odds of success in the job hunt appear to be improving for IT professionals with certain skills.The economy added 321,000 jobs overall in November -- and IT hiring was part of the upswing.ALSO ON NETWORK WORLD: How to lure tech talent with employee benefits, perks David Foote, the CEO of Foote Associates, an IT labor analyst and research firm, said the number of new IT jobs stood at 17,300 in November, compared to 12,900 in October. Similarly, Janco Associates, a consulting firm that tracks IT hiring, reported a gain of 12,700 IT jobs in November, compared to 6,900 in October.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Mobile device makers unleash FIDO

2. Apple CEO Tim Cook among 8 finalists for Time's Person of the Year

3. Guidance counselor in need of one takes to Facebook and threatens to 'shoot' protesters

4. 2014: The year smartwatches died

5. Microsoft unifies communication between Skype and Lync

6. IDG Contributor Network: Lego-like modular kit lets you create Internet of Things devices

7. Companies are movin' on up to .com domain names

8. Xojo: A Linux development suite that doesn't really support Linux

9. Patch Tuesday Dec 2014: 7 fixes, 3 critical patches for Windows, IE and Office

10. Apple iOS 8.1.2 for iPhone, iPad addresses disappearing ringtones mystery

11. Microsoft delivers Office mobile management in Intune update

12. Over 30 vulnerabilities found in Google App Engine

13. Comcast sued for launching public Wi-Fi hotspots from customers' routers

14. The Turla espionage operation also infected Linux systems with malware

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs

This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Mobile device makers unleash FIDO

Vendors of mobile devices are lining up to implement an authentication scheme meant to make online transactions both simpler and more secure, known as the Fast Identity Online (FIDO) specification, which is being released today.Within a year there could be 20 to 30 vendors integrating FIDO in shipping products, says Michael Barrett, who heads up the FIDO Alliance, an industry group of more than 150 members that has written the specification.+ Also on Network World: Can the FIDO Alliance Help Obsolete User Name/Password Authentication? | Hackers leak top Sony executives' emails +To read this article in full or to leave a comment, please click here READ MORE

Apple CEO Tim Cook among 8 finalists for Time's Person of the Year

Apple CEO Tim Cook, who dazzled the industry with new iPhones and iPads and showed strength by becoming the first Fortune 500 CEO to publicly announce he is gay, has made Time magazine's short list for Person of the Year for 2014.Cook, who filled Steve Jobs' big shoes in 2011, has a shot at winning an honor from Time that Jobs never won. The very well compensated Cook was also a finalist in 2012.To read this article in full or to leave a comment, please click here READ MORE

Guidance counselor in need of one takes to Facebook and threatens to 'shoot' protesters

A Pennsylvania high school guidance counselor has chosen one of the worst ways imaginable to demonstrate to her students the dangers of using social media while under the influence of anger.MaryKate Blankenburg, an employee of Central Bucks High School West in Doylestown, Pa., was unhappy that people were planning to protest the recent legal decisions in Ferguson, Mo., and Staten Island, N.Y., at the Philadelphia Eagles home football game on Sunday.So she posted on Facebook: "If my child cannot get to the Eagles game due to protesters, I will personally SHOOT every one of them. You've been warned idiots!!"Here is a screen capture, courtesy of a Philadelphia TV station:To read this article in full or to leave a comment, please click here READ MORE

2014: The year smartwatches died

The excitement for smartwatches that kicked off this year has devolved into widespread disappointment. READ MORE

WHITE PAPER: CommVault

Enhancing Application Protection and Recovery

This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable. Learn More

Microsoft unifies communication between Skype and Lync

People can now make video calls between the two clients, rather than having to use the same one. READ MORE

IDG Contributor Network: Lego-like modular kit lets you create Internet of Things devices

An engineering kit called SAM, recently funded at Kickstarter, is bringing building block, drag-and-drop Internet of Things development to the masses. READ MORE

Companies are movin' on up to .com domain names

More businesses are investing in the tried-and-true .com after seeing their efforts with new domain names fall flat. READ MORE

Xojo: A Linux development suite that doesn't really support Linux

If an IDE requires outdated versions of Linux, it may as well not even support Linux. READ MORE

WHITE PAPER: CommVault

The Critical Need for Edge Data Protection

IDC believes the need to protect sensitive data residing on desktops, laptops, and mobile devices is more critical than ever. CommVault Edge can meet end user demands by delivering a secure solution that allows users access to their data anywhere. Learn More

Patch Tuesday Dec 2014: 7 fixes, 3 critical patches for Windows, IE and Office

Congratulations for making it to the last Patch Tuesday in 2014. The congrats part is directed toward you because it was a year of Microsoft cluster-flubbed fixes for flaws, whether that was due to shoddy QA processes or Microsoft botched it elsewhere. Let's hope Microsoft's 2015 patches don't prove to be as problematic or as frustrating for admins. For December, there are seven security updates; the three critical security patches are all to close remote code execution (RCE) holes in all supported versions of Microsoft Windows—including the Technical Previews—all supported Internet Explorer versions, and Office for Word 2007, 2010, 2013 and even Word 2011 for Mac OS X.To read this article in full or to leave a comment, please click here READ MORE

Apple iOS 8.1.2 for iPhone, iPad addresses disappearing ringtones mystery

Bob Brown, Network World Apple on Tuesday released an iOS update (8.1.2) for the iPhone and iPad that includes unspecified bug fixes, aside from one that the company identified as possibly resulting in ringtones purchased from iTunes disappearing.If you have had issues with tones going poof!, Apple recommends heading here after updating to 8.1.2.To read this article in full or to leave a comment, please click here READ MORE

Microsoft delivers Office mobile management in Intune update

The updates Microsoft has made to its Intune PC and device management service this week are partly catching up to other MDM systems with features like containers for apps and files, a managed browser and bulk enrollment for iOS devices. But they also add unique options for managing Office apps on iOS and Android.Intune now lets you set conditional access to Exchange Online and Office 365 (a feature that was already available to customers with Exchange 2013 on-site). "Before you let email or files flow onto a device, you can go check if it's managed by Intune and if it's compliant," senior director of product marketing Andrew Conway explained. "You can set up the compliance policy: you can require a 4-digit PIN, you can require a device that's not jail-broken or rooted."To read this article in full or to leave a comment, please click here READ MORE

Over 30 vulnerabilities found in Google App Engine

Serious vulnerabilities exist in Google App Engine (GAE), a cloud service for developing and hosting Web applications, a team of security researchers has found.The vulnerabilities could allow an attacker to escape from the Java Virtual Machine security sandbox and execute code on the underlying system, according to researchers from Security Explorations, a Polish security firm that found many vulnerabilities in Java over the past few years."There are more issues pending verification—we estimate them to be in the range of 30+ in total," wrote Adam Gowdiak, the CEO and founder of Security Explorations, in a post on the Full Disclosure security mailing list that describes his company's GAE findings. The Security Explorations researchers couldn't fully investigate all of the issues because their test account on GAE was suspended, likely due to their aggressive probing, he said.To read this article in full or to leave a comment, please click here READ MORE

Comcast sued for launching public Wi-Fi hotspots from customers' routers

A class-action lawsuit filed in San Francisco last week charges Comcast with exploiting its broadband customers by using their in-home routers to send a separate signal for public Wi-Fi hotspots that extend into their neighborhoods, according to a recent San Francisco Chronicle report.Comcast has pushed its plan to create public Wi-Fi hotspots to 19 cities so far, and reportedly plans to launch 8 million hotspots by the end of the year. I covered the project when it launched in Chicago this summer. Here's a quick breakdown from that article on how Comcast is approaching the project.To read this article in full or to leave a comment, please click here READ MORE

The Turla espionage operation also infected Linux systems with malware

A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.The Turla campaign, also known as Snake or Uroburos, was originally uncovered in February, but goes back several years. The massive operation has infected computers at government organizations, embassies, military installations, education and research institutions and pharmaceutical companies in over 45 countries.The newly identified Turla component for Linux was uploaded recently to a multi-engine antivirus scanning service and was described by security researchers from antivirus vendor Kaspersky Lab as "a previously unknown piece of a larger puzzle."To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Coresite

4 Advantages of Multi-Tenant Data Centers

Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded them by outsourced cloud solutions, which can provide exponential cost savings. Learn More >>

SLIDESHOWS

Cisco's top 10 innovations over the years

A look back at Cisco's most innovative moves in its 30 years in the industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Mobile is the next 'sea change' in recruiting

2. Top 10 states for tech workers willing to relocate

3. Arista fires back at Cisco's suits

4. Microsoft sues AT&T customer for activating pirated copies of Windows 7 & Office 2010

5. Cisco's top 10 innovations over the years

6. 11 technologies Apple has killed

7. Red Hat product president Paul Cormier disses the Docker myth

8. 30 years of Cisco: The networking giant's boldest predictions over the years

9. Cisco slaps Arista Networks with patent, copyright infringement suits

10. Peeping into 73,000 unsecured security cameras thanks to default passwords

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment