Issue highlights 1. HP, NEC to develop next-generation x86 servers 2. Geek-themed Meme of the Week: No. 5 3. US court renews permission to NSA to collect phone metadata 4. SIM cards vulnerable to hacking, says researcher 5. Ubuntu forum defaced, breached by hackers 6. Diagnosis bloatware: 9 empty-calorie pieces of code 7. About those iPhones that apparently didn't electrocute anyone 8. INSIDER Seven things you need to know about hardware disposal 9. How to Screw up an IT Project 10. Software employment grows 45% in 10 years, as angst in engineering grows 11. SAP's Snabe to step down in 2014, McDermott to become sole CEO 12. True tales of (mostly) white-hat hacking |
RESOURCE COMPLIMENTS OF: Data+ Conference Data+, which evolved from the former BI & Analytics Perspectives Conference, takes place September 8-10, 2013 in Scottsdale, Arizona. Over the course of this two-day event, 250+ IT decision-makers and business leaders, like you, connect with peers and leading big data business and technology solution providers. Register now. |
Hewlett Packard and Japan's NEC will expand their existing partnership to develop high-end x86-based servers for cloud and Web applications. READ MORE |
They are like fast-food joints: everywhere. Most are lame. A few are funny, so I have started publishing a weekly selection of memes that amuse me. Here is No. 5. If you'd like more: Geek-themed Meme of the Week: No. 1 Geek-themed Meme of the Week: No. 2 READ MORE |
The Foreign Intelligence Surveillance Court has renewed permission to the U.S. government for a controversial program to collect telephone metadata in bulk. READ MORE |
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference. READ MORE |
RESOURCE COMPLIMENTS OF: Cisco Knowing is half the battle. And there are many technical challenges for virtualized network environments on the way to cloud-readiness. Gary Kinghorn, Senior Solution Marketing Manager at Cisco, and Bob Laliberte, Senior Analyst at the Enterprise Strategy Group (ESG), discuss these obstacles in this informative webinar. Learn how Cisco Nexus 1000V helps |
A website dedicated to discussion of the Ubuntu Linux distribution was breached on Saturday, with hackers gaining access to encrypted passwords and email addresses. READ MORE |
A look at the slowing, fattening, system-gunkifying software that gives us all indigestion. READ MORE |
Question: If, as multiple press reports suggest, it appears to be unauthorized iPhone chargers built by third parties that have been responsible for an electrocution and a near-fatal shock in China, why do headlines about these tragedies almost all call them "iPhone electrocutions?" That's a rhetorical question. Of course I know why. READ MORE |
From the first day that you plug in a new piece of IT hardware, the clock starts ticking toward the day when it will be pulled out of service. READ MORE |
RESOURCE COMPLIMENTS OF: LogMeIn For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today. |
Project management experts discuss sure-fire ways to delay or derail a project and--more importantly--how you can avoid these common project management pitfalls. READ MORE |
Software development employment has increased over the past 10 years, but not all IT areas have done as well. The number of jobs for engineers fell over the same period. READ MORE |
SAP co-CEO Jim Hagemann Snabe will leave his post in May 2014 to become a member of the enterprise software vendor's supervisory board, leaving Bill McDermott as sole CEO. READ MORE |
Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security READ MORE |
WEBCAST: Hitachi and SAP The ability to store data in-memory is crucial to move business from traditional business intelligence to business advantage through big data. Hitachi Data Systems offers a scalable, high-performance solution for SAP HANA that delivers real-time answers to the business based on a platform that supports mission-critical use cases. Learn more |
SLIDESHOWS Can your IP address give away your identity? Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address? JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. iPad 5 rumor rollup for the week ending July 18 2. 'This is a 3D printed jet engine' 3. Just like that, Android 4.3 is out, ahead of its release date 4. Hijacking Office 365 and other major services via cookie re-use flaw 5. New vulnerability found in Java 7 opens door to 10-year-old attack 6. Apple, Samsung phone security features to be scrutinized 7. Yahoo chief Marissa Mayer's first year 8. Facebook Open Compute project has "weaknesses," Cisco CEO says 9. Cisco building an Internet of Everything router: Chambers 10. Citrix edges Microsoft and VMware in VDI face-off | |
No comments:
Post a Comment