Sunday, September 08, 2013

15 geeky places to visit before you die

Here's how to best secure your data now that the NSA can crack almost any encryption

IT offshore outsourcers are top L-1 visa users, U.S. says

Network World Daily News AM
September 08, 2013
Share this email

15 geeky places to visit before you die

If you like reliving geeky history, you'll want to add visiting to these places to your bucket list

READ MORE
 

Issue highlights

1. Here's how to best secure your data now that the NSA can crack almost any encryption

2. IT offshore outsourcers are top L-1 visa users, U.S. says

3. Curved-screen TVs fall flat

4. Big Data Drives City of Buffalo's Operation Clean Sweep

5. MIT's inflatable antennae could boost small satellite communications

6. How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid

7. Microsoft's picture-authentication welcomed given password fatigue

8. From calculators to tablets, Intel to emphasize mobile era

9. Schneier on NSA's encryption defeating efforts: Trust no one

RESOURCE COMPLIMENTS OF: SolarWinds

Free Whitepaper from SolarWinds: NetFlow Tips & Tricks

Network bandwidth usage is one of the biggest contributors to your network performance. By taking advantage of the flow technology that is built into most routers and switches, you can quickly identify bottlenecks and troubleshoot bandwidth related problems. Take your NetFlow skills to the next level! Read this FREE whitepaper for an introduction to NetFlow & other flow technologies, as well as configuring your network to collect flow data.

Here's how to best secure your data now that the NSA can crack almost any encryption

The latest Snowden-supplied bombshell shook the technology world to its core on Thursday: The NSA can crack many of the encryption technologies in place today, using a mixture of backdoors baked into software at the government's behest, a $250 million per year budget to encourage commercial software vendors to make its security "exploitable," and sheer computer-cracking technological prowess. READ MORE

IT offshore outsourcers are top L-1 visa users, U.S. says

The IEEE-USA is calling for reform of the L-1 visa program following release of a government report that identified IT offshore outsourcers as its major users. READ MORE

Curved-screen TVs fall flat

To turn around dropping sales, TV manufacturers are working on a number of technologies including curved screens, which were shown off by a number of vendors at the IFA trade show this week. READ MORE

WEBCAST: IBM and Intel

IBM Delivers Innovation On New x86 Systems and Solutions

Live Webcast: Tuesday, September 10, 2013 3:00 PM EDT You need an IT infrastructure that provides scalability, performance and efficiency tailored to the specific goals of your business. Join us on September 10 to learn more about IBM's new innovation designed to provide the performance and efficiency required for today's workloads. Register Now

Big Data Drives City of Buffalo's Operation Clean Sweep

By layering data from 311 and 911 calls over Census data, unemployment data and other poverty indicators, Buffalo uses data analytics to identify its most challenged neighborhoods and more effectively deploy resources for everything from neighborhood beautification to combatting crime and reducing fire hazards. READ MORE

MIT's inflatable antennae could boost small satellite communications

Researchers at the Massachusetts's Institute of technology say they have developed an inflatable antenna for small satellites known as cubesats that can fold into a compact space and inflate when in orbit. READ MORE

How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid

It isn't yet time to stock up on canned beans and bottled water, but a potential conflict with Syria--which hasn't been shy about attacking vulnerable U.S. infrastructure--should have your organization reviewing its disaster-preparedness plans. READ MORE

WHITE PAPER: HP

Why Your Organization Needs a Next Generation Firewall

Learn why next-generation firewalls hold promise to combat the evolving threat landscape, how to make the business case for the technology, and how to select the solution that's right for your organization. Learn More

Microsoft's picture-authentication welcomed given password fatigue

But while an alternative for consumers, picture-passwords a poor choice in enterprises because they do not work with Active Directory READ MORE

From calculators to tablets, Intel to emphasize mobile era

Intel's dominance of the chip market is starting to wane as PC shipments slump and smartphone and tablet adoption grows, but the manufacturer will try to prove it can make fast and power-efficient processors for mobile devices at its annual developer gathering next week. READ MORE

Schneier on NSA's encryption defeating efforts: Trust no one

The U.S. National Security Agency's efforts to defeat encrypted Internet communications, detailed in news stories this week, are an attack on the security of the Internet and on users' trust in the network, some security experts said. READ MORE

WHITE PAPER: Brocade Communications

SDN: The next wave of networking innovation

Brocade and IDG bring you this exclusive eBook exploring the impact of today's IT and Data Center challenges on your network. With a focus on software-defined networks, use this eBook to start your evolution toward a flatter, less complex and more agile network architecture—an architecture ready for the future. View Brocade's eBook on SDN

SLIDESHOWS

Top tech hoarders: 15 companies with huge cash piles

Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Researchers develop attack framework for cracking Windows 8 picture passwords

2. Report: NSA defeats many encryption efforts

3. Cisco users on Notice

4. 10 hard-earned lessons of a lifetime in IT

5. Court orders retrial in Google Maps-related murder case

6. Microsoft Patch Tuesday aims at IE (again) and SharePoint

7. Top tech hoarders: 15 companies with huge cash piles

8. Poachers beware: Instant Wild camera system has its eye on you

9. Could this be Cisco's Internet of Everything core switch/router?

10. VMware faces uphill climb against Amazon, others in public cloud market

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: