High-tech

High-tech
Light

Sunday, November 30, 2014

Pi, translated: The evolution of Raspberry Pi

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 30, 2014 8:01 AM
Subject: Pi, translated: The evolution of Raspberry Pi
To: <aquarianm@gmail.com>
Cc:

What it's like living on a Chromebook, Part 2

5 ways to escape password hell

Network World Daily News AM
November 30, 2014

Pi, translated: The evolution of Raspberry Pi

A brief history of PiThe Raspberry Pi has been the object of a great deal of nerdy affection since its initial release in 2012. A mousetrap-sized, self-contained single-board computer, the Pi is designed to serve as both an educational tool and a handy option for hobbyists – who have turned it into, well, pretty much anything you can think of. Here's a look back through the brief but illustrious history of the Pi.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. What it's like living on a Chromebook, Part 2

2. INSIDER 5 ways to escape password hell

3. SDN groups respond to Cisco's "game over"

4. 4 ways your competitors are stealing your IT talent

5. Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

6. UCLA, Cisco & more join forces to replace TCP/IP

7. Watch Out for These 3 Holiday Shopping Scams

8. IDG Contributor Network: There is No Substitution for In-House Security Professionals.

9. INSIDER 8 significant software releases of 2014

10. 7 great MOOCs for techies -- all free, starting soon!

11. Does being first in supercomputing still matter?

12. Why CIOs need to embrace new norms of the hybrid cloud

13. Top tech turkeys of 2014

: MoreDirect

Disaster Recovery Interactive eGuide

In this eGuide, Computerworld along with sister publications InfoWorld and CIO look at recent disaster recovery trends and offer expert opinions and advice. Read on to learn how the right disaster recovery efforts can protect your organization's data. Learn More

What it's like living on a Chromebook, Part 2

I spent a week living in a Chromebook, and I actually rather enjoyed it.But there were still some obstacles that prevented me from being able to use a Chromebook, and only a Chromebook, as the center of my computing world. Namely: video editing and audio editing. If I could find solutions to those, I'd be living the sweet life on this here Chromebook.See also: What it's like living on a Chromebook, Part 1 This last week I've dedicated myself to the proposition that overcoming these obstacles is possible – and I was determined to do it.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

5 ways to escape password hell

Security can be a vicious cycle. A breach occurs. Enterprises add a new level of security. That increases inconvenience for users, who find workarounds. Then there's another breach and the cycle begins again.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

SDN groups respond to Cisco's "game over"

A couple of organizations are taking issues with Cisco CEO John Chambers' claims that it's "game over" for SDN and that Cisco has won the SDN battle with its Application Centric Infrastructure. The Open Networking Foundation, which is encouraging standardization of the classical SDN model of decoupled control and data planes facilitated by the OpenFlow protocol, has butt heads with ONF member Cisco before.To read this article in full or to leave a comment, please click here READ MORE

4 ways your competitors are stealing your IT talent

One of the best places for your competitors to find great talent is within the walls of your company. If your best and brightest have been jumping ship to work for your biggest rival, it's important to know how they're being recruited, why they are being targeted and what you can do to stop it. Here's how your competitors may be poaching your talent.They're Using Professional Search Tactics Savvy companies know that the best talent is often already employed - with their competitors. Hiring a professional search firm -- or if that's not financially feasible, copying their subtle approach -- can lure away even the most content employees. As this Inc. Magazine article points out, targeting successful talent and then making contact via social networks like Facebook or LinkedIn, or at professional networking events, conferences or industry events with the promise of a "great opportunity" can pique their interest and entice them to consider a move.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

A New Opportunity for Capacity Planners

Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More

Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

Gartner IaaS Research Director Kyle Hilgendorf says one of the most common questions he gets from enterprise customers looking to go to the cloud is: AWS or Azure?Amazon Web Services has been anointed the public IaaS cloud leader by Gartner and many others, but over the past year or so Satya Nadella's Microsoft has made significant advancements to its public cloud platform. AWS now has competition.AWS clearly has a lead, and a pretty sizeable one, Hilgendorf says. But, it's a marathon, not a sprint: "The race has just begun, and it's a very long race," Hilgendorf said during a presentation at AWS re:Invent comparing the two providers.+ MORE AT NETWORK WORLD: re:Cap of re:Invent 10 Cool new features to Amazon's cloud | Hot new products from AWS re:Invent +To read this article in full or to leave a comment, please click here READ MORE

UCLA, Cisco & more join forces to replace TCP/IP

Big name academic and vendor organizations have unveiled a consortium that's pushing Named Data Networking (NDN), an emerging Internet architecture designed to better accommodate data and application access in an increasingly mobile world. READ MORE

Watch Out for These 3 Holiday Shopping Scams

'Tis the season to be scamming.It's no secret that Americans are about to spend a lot of money during this upcoming holiday shopping season. Holiday sales are expected to hit nearly $617 billion this year – this after consumers spent $2.29 billion on Cyber Monday alone in 2013.That's a big pile of money and credit card numbers and passwords and logins for scammers to jump into, whether through point of sale hacks or phishing scams that go beyond just email.To read this article in full or to leave a comment, please click here READ MORE

IDG Contributor Network: There is No Substitution for In-House Security Professionals.

This post is not about adequate versus inadequate cyber security professionals. Instead, it's an argument for how critical it is to employ full-time in-house cyber security professionals who are dedicated to the constant needs of one organization, versus outsourcing cyber security to a third-party managed security service provider (MSSP) and/or consulting organization.I have always been of the opinion that if one wants to gauge an organization's dedication to the protection of information, they should be asking how many full-time employees are on the payroll that are dedicated to cyber security?If the answer is none, or if the employees are part-time and have other IT responsibilities, they should look critically at the additional information that this organization provides. This is particularly important for organizations that are highly regulated and/or are common targets of cyber criminals.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Surfwatch Labs

How to Raise Cyber Risk Management to the C-Suite

In this webcast, CSO publisher Bob Bragdon leads a discussion with SurfWatch Labs Founder and Chief Architect, Jason Polancich and Terrago Technologies Chief Executive Officer Chris Broderick, around this shift of cybersecurity responsibility from the Server Room to the Board Room. Learn More

INSIDER

8 significant software releases of 2014

We looked back at the multitude of software releases in 2014, and selected ones that made an impact. Many of these could continue to transform the tech industry into 2015 and beyond.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

7 great MOOCs for techies -- all free, starting soon!

Always be learningBig data, open source software, security -- these are some of the IT skills most in demand today and for the near future. Fortunately, free classes, in the form of Massive Open Online Courses (MOOCs), are available to help you keep pace with these and many other IT-oriented subjects. Offered by top universities as well as online education platforms (often in partnership), IT MOOCs can help you keep your skills sharp and resume updated.To read this article in full or to leave a comment, please click here READ MORE

Does being first in supercomputing still matter?

NEW ORLEANS -- The European forecast of Hurricane Sandy in 2012 was so far ahead of U.S. models in predicting the storm's path that the National Oceanic and Atmospheric Administration was called before Congress to explain how it happened.NOAA administrator Kathryn Sullivan told lawmakers at a hearing last year that the Europeans "set a target and a policy of staying very close to the leading edge of computational capacity." That's in contrast to the U.S., which "falls further and further behind the cutting edge" and then follows it with a "big step forward," she said.That's how things work in the U.S. When the Soviets launched Sputnik in 1957, the "big step forward" for the U.S. was the moon landing in 1969. It crushed the competition.To read this article in full or to leave a comment, please click here READ MORE

Why CIOs need to embrace new norms of the hybrid cloud

Forget viewing yourself as a cloud services broker. In today's hybrid cloud enterprise the CIO's truly high value role is the creation of seamless business flows that bridge cloud and on-premisec infrastructure to help the business operate better, says Intel CIO Kim Stevenson.Hybrid Cloud: The time for adoption is upon us For most CIOs, a hybrid environment — a combination of on-premise and cloud-based infrastructure and applications — is, or soon will be, a fact of life. The real trick, she says, is to understand that hybrid isn't about cost. It is about innovation cycles and where you, as a CIO, can deliver innovation faster at better value. Innovation that allows the business to get a product to market a quarter sooner is almost certainly of much higher value than saving some cost by choosing the cheapest cloud service.To read this article in full or to leave a comment, please click here READ MORE

Top tech turkeys of 2014

Giving thanksIt's that time of the year again, when people all across America sit down with their families to a nice home-cooked meal and collectively laugh at the people who did more embarrassing stuff than them. Even if that's not how you celebrate Thanksgiving, you can at least be thankful that you're not one of these people.Ted Cruz declaring 'Obamacare for the internet'Republican Senator from Texas Ted Cruz swiftly responded to President Obama's recent call for the FCC to reclassify and regulate the internet like a utility by declaring on Twitter that "net neutrality is Obamacare for the internet." No one – probably Cruz included – quite knew what he meant by this, other than to pander to the people who already support him. If people think Obamacare is bad, then just call net neutrality Obamacare and they'll think that's bad, too. The worst part is, for some people, it'll probably work.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Compuware

Mainframe Excellence 2025

With the right long- term strategy, next-generation IT leaders can leverage their mainframe application portfolios in ways that generate transformative business value and competitive advantage for the next 10 to 15 years - and beyond. Learn More

SLIDESHOWS

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 14 go-to tools for Mac sysadmins

2. 11 technologies Apple has killed

3. No, Walmart, you can't walk away with my smartphone for price-matching purposes

4. Google launching 20 Internet balloons per day

5. 11 Black Friday deals for HP Pavilion All-in-One PCs with Windows 8.1

6. 20+ Jaw-Dropping Black Friday 2014 Tech Deals

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Regin is groundbreaking malware on par with Stuxnet, Symantec says

9. SDN groups respond to Cisco's game over

10. Microsoft cold-shoulders Server 2003 and XP users hit with Microsoft Update error 0x80248015

Follow Network World

...

No comments:

Post a Comment