Wednesday, July 10, 2013

10 Hot Security Startups to Watch

  First Look: Google Chrome 28 browser | Cisco Live Distinguished Speaker Hall of Fame: First Inductees
 
  Network World After Dark

Forward this to a Friend >>>


10 Hot Security Startups to Watch
Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world. Read More


WHITE PAPER: Cisco Systems

An In-Depth Guide for Data Center Transformation
To prepare your data center for cloud, you need a holistic framework: Cisco Domain Ten. Use this comprehensive guide to create a roadmap, find best practices and use-cases, and learn the ten crucial factors that can make or break your project. Read Now

WHITE PAPER: FICO (Fair Isaac)

Cloud Analytics for the Masses
Learn the best practices in building applications that can leverage volume, variety and velocity of Big Data for organizations of any size. Learn more.

First Look: Google Chrome 28 browser
A new rich notification feature, a different kind of WebKit and a raft of security fixes made it into the latest stable version of Google's Chrome browser. Read More

Cisco Live Distinguished Speaker Hall of Fame: First Inductees
"The average teacher explains complexity; the gifted teacher reveals simplicity." ~Robert Brault Read More

The coming Microsoft reorg: What's in it for customers?
The rumored reorganization of Microsoft, which could be unveiled as soon as tomorrow, will go unnoticed by customers in the near-term, analysts said. Read More

NASA wants to bring back hunks of Mars in future unmanned mission
The space missions to Mars have so far been one way - satellites and robotic rovers have all gone up but not come back. NASA, as part a of a new, ambitious Mars visit wants to change that by sending a rover to the surface of the Red Planet which can dig up chunks of the surface and send them back to Earth for highly detailed examination. Read More

Hitachi brings high-end flash to midrange HUS VM storage line
Enterprises are gaining the ability to turn existing storage platforms over to flash even as solid-state media remains mostly a tool for caching and for applications with special requirements. Read More

New disaster recovery pricing system bases charges on how much data is recovered, not backed up
There's a dirty little secret in the disaster recovery industry, according to Dave Simpson, who tracks the storage market for the 451 Research Group. Usually, customers require less recovery than industry vendors make them believe, he says. But vendors charge customers based on how much data they back up, when in reality it's rare for an organization to require a complete recovery of all its backed up data. Read More

EMC battles rogue backups
With a new set of hardware and software releases, EMC is promising to simplify its customers' storage infrastructure by combining different types of operation into a single EMC system. Read More

Microsoft's new app security rules dubbed a paper tiger
One analyst said he believes giving developers six months to fix an app, so as to not scare away developers, is excessive Read More

AT&T teases July 16 announcement about 'what's next in wireless'
AT&T is planning a July 16 announcement to divulge "what's next in wireless," which could be news regarding a rollout of faster LTE-Advanced network technology or other innovations. Read More

The nastiest cyber security stink-bombs of 2013 (so far)
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess Read More

 

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: