Wednesday, November 14, 2012

20 MacGyver IT tools | THE Tech GAME: Harvard v Yale

  Harvard vs. Yale: The Game of network and computing research | 2010's GSA conference scandal hits SC12
 
  Network World After Dark

Forward this to a Friend >>>


MacGyver IT: 20 tools for hero hacks
On the road, under duress, or out in the boonies -- save the day with these essential IT troubleshooting and repair tools Read More


WHITE PAPER: IBM

Delivering enterprise solutions for a world on the move
IBM supports SAP clients with business consulting services with global implementation and outsourcing capabilities plus infrastructure of optimized servers (mainframe, POWER, x, BladeCenter) and storage, DB2 database, Alloy, middleware and software. An innovation partner for SAP projects. Learn More.

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

Harvard vs. Yale: The Game of network and computing research
Harvard University and Yale University's football teams meet in Cambridge, Mass., this Saturday, Nov. 17, 2012, for the 129th time in their history. Blood will be spilled, grass will be torn up, alums will reconnect and memories will be made. It's safe to say that not many in attendance will be thinking about the network and computing research efforts underway at these Ivy League schools, so we're here to give a quick rundown of some recent efforts as a sort of pre-game warmup. Read More

2010's GSA conference scandal hits SC12
GSA excesses at a Las Vegas conference two years ago prompted a cutback in U.S. government travel budgets -- and that means fewer federal researchers at this year's supercomputing conference. Read More

Gartner's state of cloud security: Outages are bigger risk than breaches
Security remains a chief inhibitor to enterprise adoption of cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the cloud, but rather that there may be a cloud outage that could lead to data loss. Read More

Extreme joins Cisco, Brocade, Huawei at 100G
Extreme Networks this week unveiled 100G and 40G Ethernet modules as well as SDN application support for its BlackDiamond X8 core switch. Read More

15 Microsoft alumni: Where are they now?
Microsoft didn't become the industry giant it is today by hiring slackers, and that's proven by taking a quick look at some of its alumni and where they have wound up. Some went on to start their own companies, some went into nonprofit work, some became leaders of rival companies and one on our list -- so far at least -- seems to be just taking it easy. Read More

Google: Gov't spying spiked & Microsoft leads the pack for copyright complaints
The United States is leading the race, but in this case, it's a very bad thing. The race is actually "government requests for disclosure of user data from Google accounts or services." The USA comes in first in government snooping with a total of 7,969 user data requests from January to June 2012, but that was tied into 16,281 user accounts. Google complied fully or at least in some degree with 90%... Read More

Google reproduces 100,000 stars in Chrome experiment
A new Google Chrome workshop virtually reproduces 100,000 nearby stars in just one tab in your web browse. The term "nearby" in this context being relative, of course. Read More

Why SDN will accelerate COTS adoption in the networking industry
SDN is a game changer for adoption of commercial off-the-shelf (COTS) technology in the network industry. Read More

The TV is the new tablet: How gesture-based computing is evolving
Few people watch television alone today, even when they're by themselves. Most are gravitating toward the multi-screen experience, in which viewers keep a smartphone, tablet or laptop close by so they can access the Web while they watch TV. But as televisions become smarter and gesture-based computing evolves, viewers may be able to mount and control everything they need on the living room wall. Read More

Highlights of Big Switch's long-awaited SDN announcement
This morning, SDN startup Big Switch unveiled its strategy to end what might be the worst job of being in stealth mode in the history of networking. I'm not sure that anyone in the networking industry wasn't at least partially aware of what Big Switch was doing. However, there were gaps in my and others' knowledge, so today's announcement clarifies the strategy. It certainly lived up to the hype,... Read More

12 touch-less computer navigation projects
Read More

Skype blocks password resets after trivial account hijacking flaw made public
Skype has disabled the account password reset option on its website following reports that the feature can be abused to hijack Skype accounts if the attackers know the email addresses associated with them. Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. App abuses Twitter IDs to produce bogus piracy 'confessions'
  2. Review: 6 slick open source routers
  3. Why is Steven Sinofsky really leaving Microsoft?
  4. NSA: Looking for a few good cybersecurity professionals
  5. OpenFlow startup takes aim at Cisco, VMware
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. iPhone to Android: How to make the switch
  8. 2013 IT salaries: 15 titles getting the biggest pay raises
  9. Mobile apps for me, me, me
  10. Extreme joins Cisco, Brocade, Huawei at 100G
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment