Tuesday, January 22, 2013

5 Tech Skills in Lowest Demand in 2013

  Company set to blast squadron of tiny satellites into space to mine asteroids | Why exactly did NBC's Brian Williams join Twitter?
 
  Network World After Dark

Forward this to a Friend >>>


5 Tech Skills in Lowest Demand in 2013
While the overall job market may still be difficult, it's generally better for those with technology skills. Even so, recruiters and hiring managers say some skillsets are a lower priority than others for their clients and companies. Here are the skillsets they say are the lowest priority in 2013. Read More


WHITE PAPER: Raritan, Inc

Remote Management and Control for Business Continuity
Data centers are susceptible to a variety of disasters, attributable to human error, system breakdowns and other factors. Secure remote access and control are essential to minimizing fallout. This white paper focuses on solutions that allow quick access and recovery of virtually any server. Learn more.

WHITE PAPER: Attachmate

Simplify Your Audits and Compliance Efforts
Managing compliance is a challenge. Learn how to apply this 3-step process to capture activity on your critical systems, analyze data in real-time, query historical records at the press of a button, and simplify your audits. Find out who did what, when—and why. Get the solution brief now. Learn More!

Company set to blast squadron of tiny satellites into space to mine asteroids
A new company intends by 2015 to send a fleet of tiny satellites, known as cubesats into near-Earth space to mine passing asteroids for high-value metals. Deep Space Industries asteroid mining proposal begins in 2015 when the company plans to send out a squadron of 55lb cubesats called Fireflies that will explore near-Earth space for two to six months looking for target asteroids MORE: The sizzling... Read More

Why exactly did NBC's Brian Williams join Twitter?
In 2009, NBC's No. 1 newsman Brian Williams made a bit of news himself when he publicly pronounced his utter disinterest in Twitter and tweeting. He even spoke of this disdain (cloaked in faux self-deprecation) on "The Daily Show with Jon Stewart." OK, lots of people didn't like Twitter in 2009. Lots of people still don't like Twitter. And never will. Read More

What every app developer can learn from mobile gaming
Many overlook mobile games because, well, they are games. But successful mobile game developers shouldn't be overlooked because they have succeeded in taming the difficult mobile app medium and converting it into revenue. The free mobile games that rely on in-app purchases of virtual goods for revenue are the most interesting examples of the skills that result in app development success. Last year,... Read More

NEC rolls out OpenFlow for Microsoft Hyper-V
NEC this week unveiled a virtual switch for Microsoft's Windows Server 2012 Hyper-V hypervisor which is designed to bring OpenFlow-based software-defined networking and network virtualization to those Microsoft environments. Read More

FTC targets outfits that crammed $70M onto phone bills
The Federal Trade Commission today said it asked a U.S. district court to stop operations of American eVoice, Ltd., eight other companies, whom the agency says stuffed some $70 million in bogus charges on consumers' phone bills. Read More

Valve starts push toward Linux gaming
PC game publisher Valve has upped the stakes on its move to bring a more robust gaming presence to Linux, advertising the Linux beta of its Steam distribution service directly to Windows-based gamers. Read More

iPhone activations on Verizon increased by 47%
Verizon released their Q4 2012 earnings today, and as we already knew, the carrier announced that they activated 9.8 million smartphones in the quarter gone by. But what we didn't know, until now, was what percentage of that figure were iPhone activations. Read More

A road warrior's guide to locking down your laptop
Mobile computing may be convenient, but it's also inherently risky. When you drag your laptop to the coffee shop or bring it along on your travels, you're making all your private data and one of your most expensive possessions a big, fat target for sticky-fingered thieves. And unlike traditional theft targets like jewelry or wallets, a laptop is an easy steal--the baddies just need to wait for you to turn your back, then grab the computer and run. In some cases, a criminal doesn't even need to steal your notebook. He can simply pull your sensitive data out of thin air. Read More

8 Tips for Firing an Employee the Right Way
If you are in IT management long enough eventually you will have to fire someone. Knowing how to do it the right way can make it less impactful and emotional for all involved. Read More

 
 
 

SLIDESHOWS

Microsoft Office Web Apps v. Google Docs
5 reasons why Google Docs is better/5 reasons why Web Apps is better.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Review: Office Web Apps vs. Google Docs
  2. Microsoft to raise Windows 8 upgrade prices by 5X
  3. Google looks to kill passwords, but experts say not so fast
  4. Weird and wonderful Raspberry Pi hacks
  5. Eric Schmidt's daughter reveals North Korea trip details
  6. RSA: How to steal encryption keys off hardware chips and smart cards
  7. Testing the privacy company Mega: 50GB free storage, 2048-bit encrypted protection
  8. Cisco SDN splash coming?
  9. Truth in IT job postings: What those want ads really mean
  10. Major flaw in Java-based Spring Framework allows remote-code execution by attacks
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

3 comments:

  1. Anonymous12:17 AM

    Generally I don't learn article on blogs, however I wish to say that this write-up very compelled me to try and do it! Your writing style has been surprised me. Thanks, quite nice article.

    Look into my web page: R Replacement Sensors

    ReplyDelete
  2. Anonymous2:21 AM

    Link exchange is nothing else but it is simply placing the
    other person's website link on your page at proper place and other person will also do same for you.

    my page - Restaurants in Orange County

    ReplyDelete
  3. Anonymous9:39 PM

    Hey there! Someone in my Myspace group shared this site with us so I came to check it out.
    I'm definitely enjoying the information. I'm book-marking and will be tweeting this to my followers!
    Terrific blog and outstanding design and style.

    my web blog - Secured personal loans

    ReplyDelete