Tuesday, January 21, 2014

Top 25 most commonly used and worst passwords of 2013

5 reasons why your IT job search is getting harder | Office 365 administration made easy

Network World Network Architecture

Forward this to a Friend >>>


Top 25 most commonly used and worst passwords of 2013
All the website breaches and endless warnings about the use of weak passwords finally soaked in and resulted in a change to the most commonly-used and worst password on the Internet, which was "password". But before you get too excited about netizens embracing better cybersecurity habits, know that "123456" is #1 and "password" fell to #2 on the list of top 25 worst passwords of 2013. Read More


WHITE PAPER: Network Instruments

Are Agents Necessary for Accurate Monitoring?
Being proactive in managing network performance means not only tracking the network and applications, but obtaining a view of the underlying infrastructure health. Selecting the best method for your team requires an understanding of the options and the ability to choose the solution that integrates well with your existing resources. Learn More

WHITE PAPER: Limelight Networks

Web Site Performance for the Speed of Business
IT organizations must look beyond raw network speed to increase website performance and deliver the superior online user experiences that drive business. Web performance is a multi-layered problem, encompassing reliability, scalability and mobile reach as well as speed. Learn More

5 reasons why your IT job search is getting harder
The IT job market is slowing down, use of contingency workers is picking up, and Congress has an unfinished fight ahead on the H-1B visa. These factors and others are making the IT hiring trends to expect in 2014. Read More

Office 365 administration made easy
Going beyond Office 365's native admin GUI, 365 Command provides powerful Exchange admin capabilities without the need to run PowerShell Read More


WHITE PAPER: IBM

Gaining and Executing a Smarter Understanding of Customers
This article discusses the urgent need for firms to successfully engage with customers, including handling issues such as social media and mobility, and at accomplishing this goal with smarter IBM collaboration and CRM solutions. Learn More.

HP sticks thumb in Microsoft's eye, discounts consumer Windows 7 PCs
Hewlett-Packard today launched a new online promotion that discounts several consumer PCs by $150 when equipped with Windows 7, saying the four-year-old OS is "back by popular demand." Read More

Start-up debuts 'shape-shifting' technology to protect web servers
Backed by a lineup of elite investors, start-up Shape Security comes out of stealth mode today by announcing technology it calls Shapeshifter that is said to prevent cyber-criminals from successfully attacking and compromising websites. Read More


WHITE PAPER: F5 Networks

A New Model for Application Services - F5 Synthesis
F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services. SDAS is the first fabric-based application delivery and control system. It enables service injection, consumption, automation, and orchestration across a unified operating framework of pooled resources. Learn more >>

Fon working with Qualcomm on new router and chip integration
With new Qualcomm-based products, more funds and a U.S. expansion, free Wi-Fi aggregator Fon expects to reach 35 million hotspots by 2016. Read More

Obama ignored NSA subverting encryption in surveillance reform speech
Other than to appease Americans, why did President Obama bother with appointing a Review Group on Intelligence and Communications Technologies if he planned to disregard, or completely ignore, many of the group's recommendations to reform the NSA? Read More

SDN startup looks to program the enterprise
SDN startup Anuta Networks has unveiled its second product, a network services virtualization systems for midsize and large enterprises. Read More

Technology of the Year 2014: The best hardware, software, and cloud services
InfoWorld's 2014 Technology of the Year Award winners recognize the best tools and technologies for developers, IT pros, and businesses Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. This Raspberry Pi Tablet is absolutely gorgeous

2. Encrypted messaging startup Wickr offers $100K bug bounty

3. 14 steps to a better, faster Windows laptop

4. 8 ways that Chrome may be challenging Windows

5. Cisco: Thousands of web hosting centers now launchpads for attacks

6. How to make 96,000lbs of WWII machinery into high-tech research platform

7. 12 toughest U.S. cities for tech recruiting

8. Microsoft Hyper-V bangs away at VMware's popularity

9. SDN will never happen, says VMware exec

10. Juniper announces Firefly Suite for virtual-machine security


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: