High-tech

High-tech
Light

Tuesday, July 22, 2014

'Nadella Effect' makes Ballmer $2.8B richer

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 22, 2014 2:04 PM
Subject: 'Nadella Effect' makes Ballmer $2.8B richer
To: <aquarianm@gmail.com>
Cc:

IRS now not sure if backup emails exist, but claims more hard drives crashed

Enterprise Collaboration Will Drive Digital Transformation

Network World Daily News PM
July 22, 2014
Share this email

'Nadella Effect' makes Ballmer $2.8B richer

Former Microsoft CEO Steve Ballmer's "devices and services" strategy may be in tatters, discarded by his successor, Satya Nadella, but Ballmer must be smiling all the way to the bank.According to U.S. Securities and Exchange (SEC) documents, Ballmer owns more than 333 million shares in Microsoft. At Monday's closing price of $44.83, those shares were valued at $14.9 billion.On the day before Ballmer stepped aside, Microsoft's share price was $36.48, putting his portfolio's worth at just over $12.1 billion. Because of the 23% increase in share value since Feb. 3, Ballmer's Microsoft holdings have appreciated in value by almost $2.8 billion.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. IRS now not sure if backup emails exist, but claims more hard drives crashed

2. Enterprise Collaboration Will Drive Digital Transformation

3. Benedict Cumberbatch carving out quite the techie movie career

4. Tor Project working to fix weakness that can unmask users

5. Leaked 'Windows 9' screenshots reveal more detail about reborn Start Menu

6. Apple orders record number of iPhones ahead of iPhone 6 launch

7. Verizon revenue rises steadily, driven by wireless service growth

8. Cybercrime wave whacks European banks

9. Virtru launches business email encryption service for Google Apps

10. New products of the week 07.21.14

WHITE PAPER: Netscout Systems Inc.

Real-Time Application-Centric Operations Visibility

This EMA whitepaper examines the move towards application/service performance visibility within IT operations, and in particular the network-based delivery of those applications and services and the role that network-based visibility can and should play. Learn More

IRS now not sure if backup emails exist, but claims more hard drives crashed

Don't get whiplash as an IRS attorney testified that the IRS is not sure if backups of Lerner's emails still exist, but other IRS officials with whom she would have communicated...their hard drives crashed too. The International Association of Information Technology Asset Managers came up with six key questions that Congress and the Department of Justice need to be asking. READ MORE

Enterprise Collaboration Will Drive Digital Transformation

Digital transformation is on the menu for most companies this year, but the ingredients needed are still being determined. However, new research highlights the recipes companies are using to evolve internal processes, structure and culture to match the evolution in customers' behavior. READ MORE

Benedict Cumberbatch carving out quite the techie movie career

wikipedia Benedict Cumberbatch, the British actor who always seems more imposing than his official 6-foot height, is establishing himself as a go-to guy for tech-themed movies.His next big splash will be portraying Alan Turing, the brilliant mathematician and "Father of Computer Science," in the movie The Imitation Game alongside Keira Knightley (Leonardo DiCaprio was rumored early on to be in contention for the leading role). Turing, who helped crack the Enigma code during World War II, had what would have been his 100th birthday celebrated around the world in 2012. To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: F5 Networks

Mitigating Multiple DDoS Attack Vectors

Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture. It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats. Learn more >>

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.The Black Hat organizers recently announced that a talk entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget" by researchers Alexander Volynkin and Michael McCord from Carnegie Mellon University's Computer Emergency Response Team (CERT) was canceled at the request of the legal counsel of the university's Software Engineering Institute because it had not been approved for public release.To read this article in full or to leave a comment, please click here READ MORE

Leaked 'Windows 9' screenshots reveal more detail about reborn Start Menu

It's no secret that an upcoming Windows update codenamed 'Threshold' will herald the return of the Start menu and allow Metro apps to operate in windowed mode. Heck, the image above came straight from Microsoft itself. But whenever fresh screenshots of the interface show up it's always worth taking a look.Myce.com recently nabbed two screenshots from a purported recent build of Threshold, which is expected to be called Windows 9 when it debuts in 2015. Right now, however, these internal builds are labeled Windows 8.1 Pro—a fact that Neowin noted earlier in July when it also nabbed a screenshot of the Start menu.To read this article in full or to leave a comment, please click here READ MORE

Apple orders record number of iPhones ahead of iPhone 6 launch

During Apple and Samsung's first California trial, Apple marketing chief Phil Schiller explained that the company calls each iPhone a success when sales of the most recent model surpass the cumulative sales of all the preceding models. Impressively, Apple has done this time and time again, and if a recent report from the Wall Street Journal is accurate, it appears that the iPhone growth train won't be stopping anytime soon.According to the Journal, Apple recently told manufacturers to prepare for what by all accounts will be the most massive and sweeping iPhone launch to date.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Venafi

Ponemon 2014 SSH Security Vulnerability Report

According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks. Learn More

Verizon revenue rises steadily, driven by wireless service growth

Record numbers of new tablet users, and the first rise in fixed-line revenue in seven years, drove Verizon Communications' second-quarter revenue up 5.7 percent year on year, it reported Tuesday.Revenue for the quarter ended June 30 totaled US$31.5 billion, up from $29.8 billion a year earlier.Wireless services continued to contribute the bulk of the company's revenue and growth, rising 5.9 percent to $18.1 billion, from $17.1 billion a year earlier. The company signed up 1.4 million net new retail postpaid customers, 1.15 million of them tablet users. That takes the company's total number of retail connections to 104.6 million, 75 percent of them smartphone users.To read this article in full or to leave a comment, please click here READ MORE

Cybercrime wave whacks European banks

Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation.         The funds transfers are affecting 34 institutions, says Tom Kellermann, chief cybersecurity officer at Trend Micro, which is assisting law enforcement in Europe with combatting this crime wave seen first in Germany during the spring, and now across several countries, including Austria, Switzerland and Sweden. So far, the crimes are being traced to Romania and Russia. The amount of money that's been fraudulently whisked out of both consumer and commercial bank accounts appears to be running in the millions.To read this article in full or to leave a comment, please click here READ MORE

Virtru launches business email encryption service for Google Apps

Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.Google Apps has some 30 million users, which is growing as companies become more comfortable with software-as-a-service, said Virtru co-founder John Ackerly.Virtru aims to make email encryption easier to set up and use. It uses a browser extension to encrypt content and attachments, which can be sent through mainstream email providers such as Microsoft, Yahoo and Google.The service also allows for fine control over messages. The encryption key for a message can be revoked, cutting off access. Message forwarding can also be restricted by managing access to its decryption key. Messages can also be tagged with an expiration time.To read this article in full or to leave a comment, please click here READ MORE

New products of the week 07.21.14

Our roundup of intriguing new products from companies such as IBM and HP. READ MORE

WHITE PAPER: HP and Intel®

12 Questions For Evaluating Your Convergence Vendor

Use the checklist in this research to derive a weighted analysis and to score whether fabric-based integration solutions should be a priority for your enterprise, or relegated for later pursuit. Learn More

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment