High-tech

High-tech
Light

Saturday, January 3, 2015

11 things to consider before going to work for a startup

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 2, 2015 2:01 PM
Subject: 11 things to consider before going to work for a startup
To: <aquarianm@gmail.com>
Cc:

Looking Back at the Year in Cloud Computing. View it in your browser

IDG Contributor Network: How to turn an old PC into a router. View it in your browser

NETWORKWORLD
Network World Daily News PM
January 02, 2015

11 things to consider before going to work for a startup

While there are some generalities about what it's like to work at a startup, each one is unique and will have its own corporate culture, different funding and different managers. However, there is something to be said for that "we are all in this together" feeling.And some enjoy the fast pace. "For many people, early-stage companies offer an allure and excitement that well-established companies can't match," says Bill O'Neil, principal consultant at WinterWyman.[Related: The Best Cities for Tech Startups ] To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. Looking Back at the Year in Cloud Computing

2. IDG Contributor Network: How to turn an old PC into a router

3. The "Future" is now (well, in October)

4. Zapier zaps connecting apps

5. How does Internet traffic travel across an ocean? These gadgets

6. Tor, TrueCrypt, Tails topped the NSA's 'most wanted' list in 2012

7. Microsoft Will Surprise in 2015

8. So you got your drone or GoPro for Christmas ... what are you going to edit the footage with?

9. Last Minute Cybersecurity Predictions for 2015

10. Old 'pole box' net beats 911 on fire call

White Paper: Attachmate

The Need for Enterprise-Grade File Transfer

From email to Dropbox and FTP, the status quo of file transfer in most organizations is UFT—or Unmanaged File Transfer. That's the troubling finding of a 2013 survey conducted by Osterman Research. Read this paper to learn how enterprise-grade Managed File Transfer (MFT) can help. View Now

Looking Back at the Year in Cloud Computing

Just about a year ago, I published my 2014 cloud computing predictions. It's been an amazing year in cloud computing, with a few of these highlights: Amazon Web Services continues to grow and innovate. At its November Reinvent conference, the more than 13,000 attendees learned about its many new services, including new Lambda, as well as new instance types (and... READ MORE

IDG Contributor Network: How to turn an old PC into a router

Regular readers of the Disruptor blog will know that I'm a big fan of self-build projects. I've written about getting started on a solar power kit and getting into drones for cheap. Well, if you liked those, here's another one that I think you might enjoy.The project is simply one of turning a redundant computer into a powerful router and firewall. In... READ MORE

The "Future" is now (well, in October)

Marty McFly is backHappy 2015, the year that Marty McFly visits the "future" in the 1989 movie "Back to the Future Part II". In the film, McFly (played by Michael J. Fox) travels from 1985 (the year the original movie came out) 30 years into the future, more precisely, Oct. 21, 2015.As the world has approached the actual date, we've... READ MORE

: Venafi

Get Ready for PCI DSS v3 Deadlines

Are you prepared for PCI DSS v3? The standard demands that IT security leaders have more visibility and security over keys and certificates. Find out what you need to know about next-generation trust protection to lock down your mobile environment. Learn More

Zapier zaps connecting apps

You could argue that the main task of IT is to connect stuff together. We connect data to processes, processes to people and other processes, hardware to hardware … it's all about getting stuff talking to achieve a goal. We turn shopping cart data into pick orders that result in people getting the junk they order online. We take text... READ MORE

How does Internet traffic travel across an ocean? These gadgets

How does Internet traffic travel across an ocean? These gadgets Optical submarine repeaters are big missile-shaped devices that lie along undersea cables carrying nearly all of the world's Internet traffic. We go inside the NEC plant that makes them. From: Network World Views: 0 0 ratings Time: 02:13 More in Science & Technology READ MORE

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' list in 2012

Three out of three? That could be the score for the U.S. National Security Agency's cryptographic "most wanted" list of 2012.In January 2012, it saw Internet traffic anonymizing tool Tor (The Onion Router), Linux distribution Tails (The Amnesic Incognito Live System) and disk encryption system TrueCrypt as the biggest threats to its ability to intercept Internet traffic and interpret other... READ MORE

: Curvature

Case Study: From Edge to Core, Across Multiple Locations

The Sisters of Charity Health System faced the challenge of offering the best technology support while keeping operational expenditures in line with budgetary constraints. They sought Curvature to develop a best-of-breed networking solution, leading to cost benefits as well as increased efficiency. Learn more

Microsoft Will Surprise in 2015

You may have noticed that I take a rather cynical view of Microsoft. But I think I am able to recognize when it does good things. As a matter of fact, I think the company made some smart moves in 2014, and it's going to benefit from them in 2015. One of those smart moves was to try to move... READ MORE

So you got your drone or GoPro for Christmas ... what are you going to edit the footage with?

So, you got a drone for Christmas or maybe a GoPro and you've shot some footage ... now what are you going to do with it?If you're a Windows user you should check out MAGIX Fastcut, an editing application with a features that make it very well-suited for creating sophisticated movies from wide angle, action cam videos.With Fastcut you can... READ MORE

Last Minute Cybersecurity Predictions for 2015

By now, every vendor, analyst, and media outlet has already published their cybersecurity predictions for 2015.  I actually described some of mine on a Co3 webinar with Bruce Schneier last week so I thought I'd put together a quick list.  Here are ten predictions in no particular order. Widespread impact from the cybersecurity skills shortage.  Demand will exceed supply for... READ MORE

Old 'pole box' net beats 911 on fire call

Who would have thought those fire alarm "pole boxes" even worked anymore?They don't in most places, but a couple of teenagers in Canton, Mass., either knew or figured it was worth a try there when they spotted a building fire Saturday night.From the Canton Police Department's Facebook page: Matt (Casamento) and W.T. (Khoury) were out and about and noticed the... READ MORE

White Paper: F5 Networks

Protecting Against Online Banking Fraud

The F5 Web Fraud Protection solution provides both the breadth and depth of coverage financial services organizations need to gain a full defense against asset loss due to fraud. Learn more about how these services give organizations a full defense to keep their business, their brand, and their users secure from the threat of fraud. Learn more >>

SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. Whatever happened to the IPv4 address crisis?

3. Top 20 colleges for computer science majors, based on earning potential

4. California bill proposes mandatory kill-switch on phones and tablets in 2015

5. ATM malware, controlled by a text message, spews cash

6. 8 free Wi-Fi stumbling and surveying tools

7. Computer science major ranks No. 8 for salary potential

8. 16 weirdest places you'll find Linux

9. Why TCP/IP is on the way out

10. How to solve Windows 8 crashes in less than a minute

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment